default search action
Jinhuan Wang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Han Wu, Jinhuan Wang:
On equivalence of state-based potential games. Sci. China Inf. Sci. 67(6) (2024) - [j39]Yuqian Lv, Bo Zhou, Jinhuan Wang, Shanqing Yu, Qi Xuan:
MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse. IEEE Trans. Circuits Syst. II Express Briefs 71(6): 3106-3110 (2024) - [j38]Junhao Zhu, Jinhuan Wang, Yalu Shan, Shanqing Yu, Guanrong Chen, Qi Xuan:
DeepInsight: Topology Changes Assisting Detection of Adversarial Samples on Graphs. IEEE Trans. Comput. Soc. Syst. 11(1): 76-88 (2024) - [j37]Shanqing Yu, Jiaxiang Li, Xu Fang, Yongqi Wang, Jinhuan Wang, Qi Xuan, Chenbo Fu:
GA-Based Multipopulation Synergistic Gene Screening Strategy on Critical Nodes Detection. IEEE Trans. Comput. Soc. Syst. 11(3): 3839-3850 (2024) - [j36]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. IEEE Trans. Comput. Soc. Syst. 11(5): 5858-5870 (2024) - [j35]Dayuan Chen, Jian Zhang, Yuqian Lv, Jinhuan Wang, Hongjie Ni, Shanqing Yu, Zhen Wang, Qi Xuan:
Single-Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning. IEEE Trans. Comput. Soc. Syst. 11(5): 6135-6150 (2024) - [j34]Zeyu Wang, Jinhuan Wang, Yalu Shan, Shanqing Yu, Xiao-ke Xu, Qi Xuan, Guanrong Chen:
Null Model-Based Data Augmentation for Graph Classification. IEEE Trans. Netw. Sci. Eng. 11(2): 1821-1833 (2024) - [j33]Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang:
Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation. IEEE Trans. Syst. Man Cybern. Syst. 54(1): 445-456 (2024) - [j32]Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, Jinhuan Wang, Tingwen Huang:
Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks. IEEE Trans. Veh. Technol. 73(9): 12426-12437 (2024) - [i18]Zeyu Wang, Tianyi Jiang, Jinhuan Wang, Qi Xuan:
Multi-Modal Representation Learning for Molecular Property Prediction: Sequence, Graph, Geometry. CoRR abs/2401.03369 (2024) - [i17]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. CoRR abs/2405.18824 (2024) - 2023
- [j31]Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang:
Privacy Preserving-Based Resilient Consensus for Multiagent Systems Via State Decomposition. IEEE Trans. Control. Netw. Syst. 10(3): 1172-1183 (2023) - [j30]Bo Zhou, Yuqian Lv, Jinhuan Wang, Jian Zhang, Qi Xuan:
Attacking the Core Structure of Complex Network. IEEE Trans. Comput. Soc. Syst. 10(4): 1428-1442 (2023) - [j29]Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, Jinhuan Wang, Tingwen Huang:
Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(4): 2190-2200 (2023) - [i16]Yuqian Lv, Bo Zhou, Jinhuan Wang, Qi Xuan:
Targeted k-node Collapse Problem: Towards Understanding the Robustness of Local k-core Structure. CoRR abs/2301.00108 (2023) - [i15]Dayuan Chen, Jian Zhang, Yuqian Lv, Jinhuan Wang, Hongjie Ni, Shanqing Yu, Zhen Wang, Qi Xuan:
Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning. CoRR abs/2305.02901 (2023) - [i14]Jinhuan Wang, Jiafei Shao, Zeyu Wang, Shanqing Yu, Qi Xuan, Xiaoniu Yang:
Subgraph Networks Based Contrastive Learning. CoRR abs/2306.03506 (2023) - [i13]Yuqian Lv, Bo Zhou, Jinhuan Wang, Shanqing Yu, Qi Xuan:
MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse. CoRR abs/2308.09601 (2023) - 2022
- [j28]Jinhuan Wang, Kaichen Jiang, Yuhu Wu:
On congestion games with player-specific costs and resource failures. Autom. 142: 110367 (2022) - [j27]Kaichen Jiang, Jinhuan Wang:
Stabilization of a class of congestion games via intermittent control. Sci. China Inf. Sci. 65(4) (2022) - [j26]Xiaoyan Dai, Jinhuan Wang, Yong Xu:
Orthogonal Decomposition of Incomplete-Profile Finite Game Space. J. Syst. Sci. Complex. 35(6): 2208-2222 (2022) - [j25]Bo Zhou, Yuqian Lv, Yongchao Mao, Jinhuan Wang, Shanqing Yu, Qi Xuan:
The Robustness of Graph k-Shell Structure Under Adversarial Attacks. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1797-1801 (2022) - [j24]Jinhuan Wang, Xiaoyan Dai, Daizhan Cheng:
Quasi-Potential Game. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4419-4422 (2022) - [c4]Kaichen Jiang, Jinhuan Wang, Yuhu Wu:
A Synchronous Updating Rule for Evolutionary Congestion Games Based on Common Information. CDC 2022: 4431-4436 - [i12]Jinhuan Wang, Pengtao Chen, Xinyao Xu, Jiajing Wu, Meng Shen, Qi Xuan, Xiaoniu Yang:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum. CoRR abs/2208.12938 (2022) - 2021
- [j23]Qi Xuan, Jinhuan Wang, Minghao Zhao, Junkun Yuan, Chenbo Fu, Zhongyuan Ruan, Guanrong Chen:
Subgraph Networks With Application to Structural Feature Space Expansion. IEEE Trans. Knowl. Data Eng. 33(6): 2776-2789 (2021) - [j22]Jinhuan Wang, Pengtao Chen, Bin Ma, Jiajun Zhou, Zhongyuan Ruan, Guanrong Chen, Qi Xuan:
Sampling Subgraph Network With Application to Graph Classification. IEEE Trans. Netw. Sci. Eng. 8(4): 3478-3490 (2021) - [c3]Jinhuan Wang, Pengtao Chen, Shanqing Yu, Qi Xuan:
TSGN: Transaction Subgraph Networks for Identifying Ethereum Phishing Accounts. BlockSys 2021: 187-200 - [i11]Jinhuan Wang, Pengtao Chen, Bin Ma, Jiajun Zhou, Zhongyuan Ruan, Guanrong Chen, Qi Xuan:
Sampling Subgraph Network with Application to Graph Classification. CoRR abs/2102.05272 (2021) - [i10]Jinhuan Wang, Pengtao Chen, Shanqing Yu, Qi Xuan:
TSGN: Transaction Subgraph Networks for Identifying Ethereum Phishing Accounts. CoRR abs/2104.08767 (2021) - [i9]Junhao Zhu, Yalu Shan, Jinhuan Wang, Shanqing Yu, Guanrong Chen, Qi Xuan:
DeepInsight: Interpretability Assisting Detection of Adversarial Samples on Graphs. CoRR abs/2106.09501 (2021) - [i8]Bo Zhou, Yuqian Lv, Yongchao Mao, Jinhuan Wang, Shanqing Yu, Qi Xuan:
The Robustness of Graph k-shell Structure under Adversarial Attacks. CoRR abs/2107.13962 (2021) - [i7]Yao Lu, Wen Yang, Yunzhe Zhang, Jinhuan Wang, Shengbo Gong, Zhuangzhi Chen, Zuohui Chen, Qi Xuan, Xiaoniu Yang:
Graph Modularity: Towards Understanding the Cross-Layer Transition of Feature Representations in Deep Neural Networks. CoRR abs/2111.12485 (2021) - [i6]Bo Zhou, Yuqian Lv, Jinhuan Wang, Jian Zhang, Qi Xuan:
COREATTACK: Breaking Up the Core Structure of Graphs. CoRR abs/2111.15276 (2021) - [i5]Qi Xuan, Zeyu Wang, Jinhuan Wang, Yalu Shan:
Data Augmentation Based on Null Model for Graph Classification. CoRR abs/2112.00476 (2021) - 2020
- [j21]Xiaoye Gao, Jinhuan Wang, Kuize Zhang:
Dynamics and control of evolutionary congestion games. Sci. China Inf. Sci. 63(1) (2020) - [j20]Yuling Xu, Jinhuan Wang, Yingwen Zhang, Yong Xu:
Event-triggered bipartite consensus for high-order multi-agent systems with input saturation. Neurocomputing 379: 284-295 (2020) - [j19]Jinhuan Wang, Yingwen Zhang, Xiaodi Li, Yongshun Zhao:
Finite-time consensus for nonholonomic multi-agent systems with disturbances via event-triggered integral sliding mode controller. J. Frankl. Inst. 357(12): 7779-7795 (2020) - [c2]Jinyin Chen, Huiling Xu, Jinhuan Wang, Qi Xuan, Xuhong Zhang:
Adversarial Detection on Graph Structured Data. PPMLP@CCS 2020: 37-41 - [i4]Qi Xuan, Yalu Shan, Jinhuan Wang, Zhongyuan Ruan, Guanrong Chen:
Adversarial Attacks to Scale-Free Networks: Testing the Robustness of Physical Criteria. CoRR abs/2002.01249 (2020)
2010 – 2019
- 2019
- [j18]Jinhuan Wang, Yuling Xu, Yong Xu, Dedong Yang:
Time-varying formation for high-order multi-agent systems with external disturbances by event-triggered integral sliding mode control. Appl. Math. Comput. 359: 333-343 (2019) - [j17]Ting Liu, Jinhuan Wang, Xiao Zhang, Daizhan Cheng:
Game Theoretic Control of Multiagent Systems. SIAM J. Control. Optim. 57(3): 1691-1709 (2019) - [i3]Qi Xuan, Jinhuan Wang, Minghao Zhao, Junkun Yuan, Chenbo Fu, Zhongyuan Ruan, Guanrong Chen:
Subgraph Networks with Application to Structural Feature Space Expansion. CoRR abs/1903.09022 (2019) - [i2]Jian-Guo Liu, Jinhuan Wang, Zhennan Zhou, Yu Zhao:
Field model for complex ionic fluids: analytical properties and numerical investigation. CoRR abs/1912.09208 (2019) - 2018
- [j16]Yajing Chu, Zhigang Zhao, David Wayne Sant, Ganqian Zhu, Sarah M. Greenblatt, Lin Liu, Jinhuan Wang, Zeng Cao, Jeanette Cheng Tho, Shi Chen, Xiaochen Liu, Peng Zhang, Jaroslaw P. Maciejewski, Stephen Nimer, Gaofeng Wang, Weiping Yuan, Feng-Chun Yang, Mingjiang Xu:
Tet2 Regulates Osteoclast Differentiation by Interacting with Runx1 and Maintaining Genomic 5-Hydroxymethylcytosine (5hmC). Genom. Proteom. Bioinform. 16(3): 172-186 (2018) - 2017
- [j15]Zhixin Liu, Lin Wang, Jinhuan Wang, Daoyi Dong, Xiaoming Hu:
Distributed sampled-data control of nonholonomic multi-robot systems with proximity networks. Autom. 77: 170-179 (2017) - 2016
- [j14]Jian-Guo Liu, Jinhuan Wang:
Refined hyper-contractivity and uniqueness for the Keller-Segel equations. Appl. Math. Lett. 52: 212-219 (2016) - [j13]Dong Cui, Jinhuan Wang, Lei Wang, Shimin Yin, Zhijie Bian, Guanghua Gu:
Symbol Recurrence Plots based resting-state eyes-closed EEG deterministic analysis on amnestic mild cognitive impairment in type 2 diabetes mellitus. Neurocomputing 203: 102-110 (2016) - [j12]Pengxiao Zhang, Jinhuan Wang:
Event-triggered observer-based tracking control for leader-follower multi-agent systems. Kybernetika 52(4): 589-606 (2016) - [i1]Zhixin Liu, Lin Wang, Jinhuan Wang, Daoyi Dong, Xiaoming Hu:
Distributed sampled-data control of nonholonomic multi-robot systems with proximity networks. CoRR abs/1609.02174 (2016) - 2015
- [j11]Lin Wang, Xiao Fan Wang, Jinhuan Wang:
Limit set problem of multi-agent systems with finite states: An eigenvalue-based approach. J. Syst. Sci. Complex. 28(3): 570-579 (2015) - 2014
- [j10]Jinhuan Wang, Zhixin Liu, Xiaoming Hu:
Consensus control design for multi-agent systems using relative output feedback. J. Syst. Sci. Complex. 27(2): 237-251 (2014) - [j9]Lei Zhang, Jinhuan Wang, Qiongyu Shi:
Multi-agent based modeling and simulating for evacuation process in stadium. J. Syst. Sci. Complex. 27(3): 430-444 (2014) - 2013
- [j8]Jinhuan Wang, Lizhong Zhao, Sining Zheng:
A reaction-diffusion system with mixed-type coupling. Appl. Math. Comput. 219(9): 4219-4224 (2013) - 2012
- [j7]Li Chen, Jian-Guo Liu, Jinhuan Wang:
Multidimensional Degenerate Keller-Segel System with Critical Diffusion Exponent 2n/(n+2). SIAM J. Math. Anal. 44(2): 1077-1102 (2012)
2000 – 2009
- 2009
- [j6]Jinhuan Wang, DaiZhan Cheng:
Stability of switched nonlinear systems via extensions of LaSalle's invariance principle. Sci. China Ser. F Inf. Sci. 52(1): 84-90 (2009) - [j5]Jinhuan Wang, Daizhan Cheng, Xiaoming Hu:
An extension of LaSalle's Invariance Principle for a class of switched linear systems. Syst. Control. Lett. 58(10-11): 754-758 (2009) - [c1]Jinhuan Wang, Zhixin Liu, Xiaoming Hu:
Consensus of high order linear multi-agent systems using output error feedback. CDC 2009: 3685-3690 - 2008
- [j4]Linghua Kong, Jinhuan Wang, Sining Zheng:
Asymptotic analysis to a parabolic equation with a weighted localized source. Appl. Math. Comput. 197(2): 819-827 (2008) - [j3]Jinhuan Wang, Linghua Kong, Sining Zheng:
Asymptotic analysis for a localized nonlinear diffusion equation. Comput. Math. Appl. 56(9): 2294-2304 (2008) - [j2]Daizhan Cheng, Jinhuan Wang, Xiaoming Hu:
An Extension of LaSalle's Invariance Principle and Its Application to Multi-Agent Consensus. IEEE Trans. Autom. Control. 53(7): 1765-1770 (2008) - 2007
- [j1]Sining Zheng, Jinhuan Wang:
Total versus single point blow-up in heat equations with coupled localized sources. Asymptot. Anal. 51(2): 133-156 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint