default search action
Shen Wang 0004
Person information
- affiliation: Harbin Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Shen Wang — disambiguation page
- Shen Wang 0001 — University of Texas at San Antonio, Department of Electrical and Computer Engineering, TX, USA
- Shen Wang 0002 — Zhejiang University of Science and Technology, Research Center for Modern Governance, Hangzhou, China
- Shen Wang 0003 — Tsinghua University, State Key Lab of Power Systems, Beijing, China
- Shen Wang 0005 — University of Illinois at Chicago, Department of Computer Science, IL, USA
- Shen Wang 0006 — University College Dublin, School of Computer Science, Ireland (and 1 more)
- Shen Wang 0007 — Lehigh University, Department of Bioengineering, Bethlehem, PA, USA
- Shen Wang 0008 — University of Warwick, UK (and 1 more)
- Shen Wang 0009 — Tianjin University, School of Mathematics, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j52]Li Liu, Shen Wang, Xunzhi Jiang:
UniBin: Assembly semantic-enhanced binary vulnerability detection without disassembly. Inf. Sci. 691: 121605 (2025) - 2024
- [j51]Xunzhi Jiang, Shen Wang, Yuxin Gong, Tingyue Yu, Li Liu, Xiangzhan Yu:
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection. Comput. Secur. 145: 104029 (2024) - [j50]Liyao Yin, Shen Wang, Zhenbang Wang, Changdong Wang, Dechen Zhan:
Attribution guided purification against adversarial patch. Displays 83: 102720 (2024) - [j49]Yuxin Gong, Shen Wang, Tingyue Yu, Xunzhi Jiang, Fanghui Sun:
Improving adversarial robustness using knowledge distillation guided by attention information bottleneck. Inf. Sci. 665: 120401 (2024) - [j48]Zhaoyang Zhang, Shen Wang, Guopu Zhu, Dechen Zhan, Jiwu Huang:
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy. IEEE Trans. Inf. Forensics Secur. 19: 8701-8716 (2024) - [j47]Yihan Yan, Xiaojun Tong, Shen Wang:
Clustered Federated Learning in Heterogeneous Environment. IEEE Trans. Neural Networks Learn. Syst. 35(9): 12796-12809 (2024) - 2023
- [j46]Tingyue Yu, Shen Wang, Xiangzhan Yu:
Global Wasserstein Margin maximization for boosting generalization in adversarial training. Appl. Intell. 53(10): 11490-11504 (2023) - [j45]Yuxin Gong, Shen Wang, Xunzhi Jiang, Liyao Yin, Fanghui Sun:
Adversarial example detection using semantic graph matching. Appl. Soft Comput. 141: 110317 (2023) - [j44]Chunrui Zhang, Gang Wang, Shen Wang, Dechen Zhan, Mingyong Yin:
Cross-domain network attack detection enabled by heterogeneous transfer learning. Comput. Networks 227: 109692 (2023) - [j43]Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 351-364 (2023) - 2022
- [j42]Shen Wang, Yuxin Gong:
Adversarial example detection based on saliency map features. Appl. Intell. 52(6): 6262-6275 (2022) - [j41]Jihua Cui, Zhenbang Wang, Shigang Tian, Junfeng Zhao, Shen Wang:
Incorporating Clustering Modification Directions into Reinforcement Learning Based Cost Learning Framework. J. Inf. Hiding Multim. Signal Process. 13(4): 239-247 (2022) - [j40]Fanghui Sun, Shen Wang, Hongli Zhang:
A progressive learning method on unknown protocol behaviors. J. Netw. Comput. Appl. 197: 103249 (2022) - [j39]Junfeng Zhao, Shen Wang:
A stable GAN for image steganography with multi-order feature fusion. Neural Comput. Appl. 34(18): 16073-16088 (2022) - 2021
- [j38]Chunrui Zhang, Shen Wang, Dechen Zhan, Mingyong Yin, Fang Lou:
Inferring Users' Social Roles with a Multi-Level Graph Neural Network Model. Entropy 23(11): 1453 (2021) - [c15]Shen Wang, Xunzhi Jiang, Xiangzhan Yu, Shuai Sun:
KCFuzz: Directed Fuzzing Based on Keypoint Coverage. ICAIS (1) 2021: 312-325 - 2020
- [j37]Fanghui Sun, Shen Wang, Chunrui Zhang, Hongli Zhang:
Clustering of unknown protocol messages based on format comparison. Comput. Networks 179: 107296 (2020)
2010 – 2019
- 2019
- [j36]Fanghui Sun, Shen Wang, Chunrui Zhang, Hongli Zhang:
Unsupervised field segmentation of unknown protocol messages. Comput. Commun. 146: 121-130 (2019) - [j35]Chunrui Zhang, Shen Wang, Dechen Zhan, Yonghui Yang:
Automatic determination of types number of mixed binary protocols. IET Commun. 13(12): 1769-1775 (2019) - 2018
- [j34]Xin Liu, Shen Wang, Jianzhi Sang, Weizhe Zhang:
A novel mapping-based lossless recovery algorithm for VSS. J. Real Time Image Process. 14(1): 51-60 (2018) - [j33]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang:
Partial secret image sharing for (k, n) threshold based on image inpainting. J. Vis. Commun. Image Represent. 50: 135-144 (2018) - [j32]Xin Liu, Shen Wang, Jianzhi Sang, Weizhe Zhang:
A novel lossless recovery algorithm for basic matrix-based VSS. Multim. Tools Appl. 77(13): 16461-16476 (2018) - [j31]Xin Liu, Shen Wang, Xuehu Yan, Weizhe Zhang:
Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multim. Tools Appl. 77(16): 20673-20696 (2018) - 2017
- [j30]Xin Liu, Shen Wang, Jianzhi Sang, Weizhe Zhang:
A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS. Int. J. Digit. Crime Forensics 9(3): 1-10 (2017) - [j29]Xin Liu, Shen Wang, Xuehu Yan, Weizhe Zhang:
Homomorphic Visual Cryptography. J. Inf. Hiding Multim. Signal Process. 8(3): 744-756 (2017) - [j28]Chen Cui, Shen Wang, Xiamu Niu:
A novel watermarking for DIBR 3D images with geometric rectification based on feature points. Multim. Tools Appl. 76(1): 649-677 (2017) - [j27]Jianzhi Sang, Shen Wang, Qiong Li:
A novel quantum representation of color digital images. Quantum Inf. Process. 16(2): 42 (2017) - [c14]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang, Song Wan, Wanmeng Ding, Hanlin Liu:
Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting. ICIG (3) 2017: 527-538 - [c13]Chunrui Zhang, Shen Wang, Dechen Zhan:
A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. IIH-MSP (2) 2017: 309-317 - [c12]Tingyue Yu, Shen Wang, Xiangzhan Yu:
A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes. IIH-MSP (2) 2017: 318-326 - 2016
- [j26]Chen Cui, Shen Wang, Xiamu Niu:
A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape. J. Inf. Hiding Multim. Signal Process. 7(3): 543-557 (2016) - [j25]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Response to the Letter to the Editor from Y.G. Yang et al. regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Xianhua Song et al., Multimedia Systems, doi: 10.1007/s00530-014-0355-3. Multim. Syst. 22(2): 273-274 (2016) - [j24]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Meaningful visual secret sharing based on error diffusion and random grids. Multim. Tools Appl. 75(6): 3353-3373 (2016) - [j23]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold progressive visual cryptography construction with unexpanded shares. Multim. Tools Appl. 75(14): 8657-8674 (2016) - [j22]Jianzhi Sang, Shen Wang, Xiamu Niu:
Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR. Quantum Inf. Process. 15(1): 37-64 (2016) - [j21]Jianzhi Sang, Shen Wang, Qiong Li:
Least significant qubit algorithm for quantum images. Quantum Inf. Process. 15(11): 4441-4460 (2016) - 2015
- [j20]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Signal Process. 38: 53-65 (2015) - [j19]Jianzhi Sang, Shen Wang, Xianhua Song, Xuehu Yan, Xiamu Niu:
A novel representation for Multi-Channel log-polar quantum images. J. Inf. Hiding Multim. Signal Process. 6(2): 340-350 (2015) - [j18]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image Represent. 26: 94-104 (2015) - [j17]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multim. Tools Appl. 74(9): 3231-3252 (2015) - [j16]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Random grids-based visual secret sharing with improved visual quality via error diffusion. Multim. Tools Appl. 74(21): 9279-9296 (2015) - [j15]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109: 317-333 (2015) - [j14]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 9(3): 499-510 (2015) - [j13]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Threshold visual secret sharing with comprehensive properties based on random grids. Signal Image Video Process. 9(7): 1659-1668 (2015) - [c11]Xin Liu, Shen Wang, Weizhe Zhang, Xiamu Niu:
A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion. IIH-MSP 2015: 172-175 - 2014
- [j12]Xianhua Song, Shen Wang, Xiamu Niu:
Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations. J. Inf. Hiding Multim. Signal Process. 5(4): 574-585 (2014) - [j11]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Dynamic watermarking scheme for quantum images based on Hadamard transform. Multim. Syst. 20(4): 379-388 (2014) - [j10]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Quantum image encryption based on restricted geometric and color transformations. Quantum Inf. Process. 13(8): 1765-1787 (2014) - [j9]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105: 389-398 (2014) - [j8]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
A Novel Perceptual Secret Sharing Scheme. Trans. Data Hiding Multim. Secur. 9: 68-90 (2014) - [c10]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing. ECC (2) 2014: 137-146 - [c9]Shen Wang, Xianhua Song, Xiamu Niu:
A Novel Encryption Algorithm for Quantum Images Based on Quantum Wavelet Transform and Diffusion. ECC (2) 2014: 243-250 - [c8]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids. ICONIP (3) 2014: 620-627 - [c7]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Essential Visual Cryptographic Scheme with Different Importance of Shares. ICONIP (3) 2014: 636-643 - [c6]Xianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu:
Flexible Quantum Image Secret Sharing Based on Measurement and Strip. IIH-MSP 2014: 215-218 - [c5]Xuehu Yan, Shen Wang, Xiamu Niu:
Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing. IIH-MSP 2014: 223-226 - [c4]Chen Cui, Shen Wang, Xiamu Niu:
Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points. IIH-MSP 2014: 247-250 - 2013
- [j7]Xianhua Song, Shen Wang, Siu-Ming Yiu, Lin Jiang, Xiamu Niu:
Detection of Image Region Duplication Using Spin Image. IEICE Trans. Inf. Syst. 96-D(7): 1565-1568 (2013) - [j6]Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. J. Inf. Hiding Multim. Signal Process. 4(2): 119-127 (2013) - [j5]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. J. Syst. Softw. 86(5): 1462-1463 (2013) - [j4]Shen Wang, Xiamu Niu:
Hiding traces of double compression in JPEG images based on Tabu Search. Neural Comput. Appl. 22(Supplement-1): 283-291 (2013) - [j3]Xianhua Song, Shen Wang, Shuai Liu, Ahmed A. Abd El-Latif, Xiamu Niu:
A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12): 3689-3706 (2013) - 2012
- [j2]Shen Wang, Xiamu Niu:
A Countermeasure against Double Compression Based Image Forensic. IEICE Trans. Inf. Syst. 95-D(10): 2577-2580 (2012) - [c3]Xianhua Song, Shen Wang, Xiamu Niu:
An Integer DCT and Affine Transformation Based Image Steganography Method. IIH-MSP 2012: 102-105 - 2011
- [c2]Shen Wang, Xiamu Niu:
A PSO Based Image Disguise Method. IBICA 2011: 129-132 - 2010
- [j1]Shen Wang, Bian Yang, Xiamu Niu:
A Secure Steganography Method based on Genetic Algorithm. J. Inf. Hiding Multim. Signal Process. 1(1): 28-35 (2010) - [c1]Shen Wang, Qiong Li, Bian Yang, Xiamu Niu:
A Novel and Secure Image Interpolation Methods for Image Disguise. IIH-MSP 2010: 482-485
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint