default search action
Wenxi Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Ziling Wang, Lai Zou, Junjie Zhang, Heng Li, Wenxi Wang, Yun Huang:
Tool axis vector optimization for robotic grinding based on measured point cloud of complex curved blade. Adv. Eng. Informatics 62: 102716 (2024) - [j12]Kefei Qian, Lai Zou, Zhiwen Wang, Wenxi Wang:
Metallic surface defect recognition network based on global feature aggregation and dual context decoupled head. Appl. Soft Comput. 158: 111589 (2024) - [j11]Xin Yang, Hongtao Huo, Chang Li, Xiaowen Liu, Wenxi Wang, Cheng Wang:
Semantic perceptive infrared and visible image fusion Transformer. Pattern Recognit. 149: 110223 (2024) - [c19]Wenxi Wang, Yang Hu, Mohit Tiwari, Sarfraz Khurshid, Kenneth L. McMillan, Risto Miikkulainen:
NeuroBack: Improving CDCL SAT Solving using Graph Neural Networks. ICLR 2024 - 2023
- [j10]Huansheng Ning, Yujia Lin, Wenxi Wang, Hang Wang, Feifei Shi, Xiaohong Zhang, Mahmoud Daneshmand:
Cyberology: Cyber-Physical-Social-Thinking Spaces-Based Discipline and Interdiscipline Hierarchy for Metaverse (General Cyberspace). IEEE Internet Things J. 10(5): 4420-4430 (2023) - [j9]Hang Wang, Huansheng Ning, Yujia Lin, Wenxi Wang, Sahraoui Dhelim, Fadi Farha, Jianguo Ding, Mahmoud Daneshmand:
A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges. IEEE Internet Things J. 10(16): 14671-14688 (2023) - [j8]Jiangyang Li, Lai Zou, Guoyue Luo, Wenxi Wang, Chong Lv:
Enhancement and evaluation in path accuracy of industrial robot for complex surface grinding. Robotics Comput. Integr. Manuf. 81: 102521 (2023) - [c18]Wenxi Wang:
An Improved ELM Wireless Sensor Network Intrusion Detection Model Based on an Optimization Algorithm. APIT 2023: 95-102 - [c17]Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari:
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks. ASE 2023: 104-115 - [c16]Armin Biere, Nils Froleyks, Wenxi Wang:
CadiBack: Extracting Backbones with CaDiCaL. SAT 2023: 3:1-3:12 - [d1]Armin Biere, Nils Froleyks, Wenxi Wang:
Sampled and Normalized Satisfiable Instances from the main track of the SAT Competition 2004 to 2022. Zenodo, 2023 - [i8]Yang Hu, Wenxi Wang, Mohit Tiwari:
Greybox Penetration Testing on Cloud Access Control with IAM Modeling and Deep Reinforcement Learning. CoRR abs/2304.14540 (2023) - 2022
- [j7]Huansheng Ning, Wenxi Wang, Fadi Farha, Jinsheng Xie, Mahmoud Daneshmand:
SocialNet of Things: A Ubiquitous Relationship Network Inspired by Social Space. IEEE Netw. 36(3): 197-203 (2022) - [j6]Lilan Liu, Xiang Wan, Jiaying Li, Wenxi Wang, Zenggui Gao:
An Improved Entropy-Weighted Topsis Method for Decision-Level Fusion Evaluation System of Multi-Source Data. Sensors 22(17): 6391 (2022) - [j5]Wenxi Wang, Huansheng Ning, Feifei Shi, Sahraoui Dhelim, Weishan Zhang, Liming Chen:
A Survey of Hybrid Human-Artificial Intelligence for Social Computing. IEEE Trans. Hum. Mach. Syst. 52(3): 468-480 (2022) - [c15]Huansheng Ning, Zhangfeng Pi, Wenxi Wang, Fadi Farha, Shunkun Yang:
A Review on Serious Games for Disaster Relief. ICDIS 2022: 408-414 - [c14]Chengpeng Li, Chenguang Zhu, Wenxi Wang, August Shi:
Repairing Order-Dependent Flaky Tests via Test Generation. ICSE 2022: 1881-1892 - [c13]Wenxi Wang, Yang Hu, Kenneth L. McMillan, Sarfraz Khurshid:
SymMC: approximate model enumeration and counting using symmetry information for Alloy specifications. ESEC/SIGSOFT FSE 2022: 1209-1220 - [i7]Huansheng Ning, Zhangfeng Pi, Wenxi Wang, Fadi Farha, Shunkun Yang:
A Review on Serious Games for Disaster Relief. CoRR abs/2201.06916 (2022) - [i6]Huansheng Ning, Hang Wang, Wenxi Wang, Xiaozhen Ye, Jianguo Ding, Per Backlund:
A Review on Serious Games in E-learning. CoRR abs/2201.06917 (2022) - 2021
- [c12]Wenxi Wang, Pu Yi, Sarfraz Khurshid, Darko Marinov:
Initial Results on Counting Test Orders for Order-Dependent Flaky Tests Using Alloy. ICTSS 2021: 123-130 - [c11]Yang Hu, Wenxi Wang, Casen Hunger, Riley Wood, Sarfraz Khurshid, Mohit Tiwari:
ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities. ESEC/SIGSOFT FSE 2021: 316-327 - [c10]Huansheng Ning, Hang Wang, Wenxi Wang, Xiaozhen Ye, Jianguo Ding, Per Backlund:
A Review on Serious Games in E-learning. SSCI 2021: 1-8 - [i5]Wenxi Wang, Huansheng Ning, Feifei Shi, Sahraoui Dhelim, Weishan Zhang, Liming Chen:
A Survey of Hybrid Human-Artificial Intelligence for Social Computing. CoRR abs/2103.15558 (2021) - [i4]Feifei Shi, Wenxi Wang, Hang Wang, Huansheng Ning:
The Internet of People: A Survey and Tutorial. CoRR abs/2104.04079 (2021) - [i3]Wenxi Wang, Yang Hu, Mohit Tiwari, Sarfraz Khurshid, Kenneth L. McMillan, Risto Miikkulainen:
NeuroComb: Improving SAT Solving with Graph Neural Networks. CoRR abs/2110.14053 (2021) - [i2]Huansheng Ning, Hang Wang, Yujia Lin, Wenxi Wang, Sahraoui Dhelim, Fadi Farha, Jianguo Ding, Mahmoud Daneshmand:
A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges. CoRR abs/2111.09673 (2021) - 2020
- [j4]Muhammad Usman, Wenxi Wang, Kaiyuan Wang, Cagdas Yelen, Nima Dini, Sarfraz Khurshid:
A study of learning likely data structure properties using machine learning models. Int. J. Softw. Tools Technol. Transf. 22(5): 601-615 (2020) - [c9]Muhammad Usman, Wenxi Wang, Sarfraz Khurshid:
TestMC: Testing Model Counters using Differential and Metamorphic Testing. ASE 2020: 709-721 - [c8]Muhammad Usman, Wenxi Wang, Marko Vasic, Kaiyuan Wang, Haris Vikalo, Sarfraz Khurshid:
A study of the learnability of relational properties: model counting meets machine learning (MCML). PLDI 2020: 1098-1111 - [c7]Jiayi Yang, Wenxi Wang, Darko Marinov, Sarfraz Khurshid:
AlloyMC: Alloy meets model counting. ESEC/SIGSOFT FSE 2020: 1541-1545 - [c6]Wenxi Wang, Muhammad Usman, Alyas Almaawi, Kaiyuan Wang, Kuldeep S. Meel, Sarfraz Khurshid:
A Study of Symmetry Breaking Predicates and Model Counting. TACAS (1) 2020: 115-134
2010 – 2019
- 2019
- [j3]Can Cheng, Jianyong Li, Yueming Liu, Meng Nie, Wenxi Wang:
Deep convolutional neural network-based in-process tool condition monitoring in abrasive belt grinding. Comput. Ind. 106: 1-13 (2019) - [j2]Wenxi Wang, Harald Søndergaard, Peter J. Stuckey:
Wombit: A Portfolio Bit-Vector Solver Using Word-Level Propagation. J. Autom. Reason. 63(3): 723-762 (2019) - [c5]Wenxi Wang, Weilong Zhang, Zhang Jin, Keyan Sun, Runlin Zou, Chenrong Huang, Yuan Tian:
A Novel Location Privacy Protection Scheme with Generative Adversarial Network. ICBDS 2019: 17-27 - [c4]Wenxi Wang, Kaiyuan Wang, Mengshi Zhang, Sarfraz Khurshid:
Learning to Optimize the Alloy Analyzer. ICST 2019: 228-239 - [c3]Muhammad Usman, Wenxi Wang, Kaiyuan Wang, Cagdas Yelen, Nima Dini, Sarfraz Khurshid:
A Study of Learning Data Structure Invariants Using Off-the-shelf Tools. SPIN 2019: 226-243 - [c2]Wenxi Wang, Kaiyuan Wang, Milos Gligoric, Sarfraz Khurshid:
Incremental Analysis of Evolving Alloy Models. TACAS (1) 2019: 174-191 - [i1]Muhammad Usman, Wenxi Wang, Kaiyuan Wang, Marko Vasic, Haris Vikalo, Sarfraz Khurshid:
A Study of the Learnability of Relational Properties (Model Counting Meets Machine Learning). CoRR abs/1912.11580 (2019) - 2016
- [j1]Tianyong Jiang, Qingzhao Kong, Wenxi Wang, Linsheng Huo, Gangbing Song:
Monitoring of Grouting Compactness in a Post-Tensioning Tendon Duct Using Piezoceramic Transducers. Sensors 16(8): 1343 (2016) - [c1]Wenxi Wang, Harald Søndergaard, Peter J. Stuckey:
A Bit-Vector Solver with Word-Level Propagation. CPAIOR 2016: 374-391
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint