Publications

  • Journals

    (=Corresponding Author)
    • Advances in Edge-cloud Collaboration and Evolution for Large-small Models (大小模型端云协同进化技术进展) [PDF]
      Y. Wang (王永威), T. Shen (沈弢), S. Zhang (张圣宇), F. Wu (吴帆), Z. Zhao (赵洲), H. Cai (蔡海滨), C. Lv (吕承飞), L. Ma(马利庄), C. Yang (杨承磊) and F. Wu (吴飞).
      Journal of Image and Graphics (中国图象图形学报) (2024).

    • AI for Science (AI4S): Intersection and Empowerment (科学智算 (AI4S): 交叉与赋能) [PDF]
      F. Wu (吴飞) S. Zhou (周晟), Y. Wang (王永威), and J. Bu (卜佳俊).
      Communications of the CCF (中国计算机学会通讯) (2024).

    • Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders [PDF]
      M. Jiang, Y. Wang † , M. J. McKeown and Z. J. Wang.
      Neurocomputing (2024).

    • Envisioning Generative AI for Defense Applications: Trends and Challenges (生成式人工智能军事化应用: 挑战与趋势) [PDF]
      Y. Wang (王永威), X. Ren (任晓雪), L. Gong (宫丽娜), X. Wang (王鑫), X. Yang (杨小虎) and F. Wu (吴飞).
      Under review (2023).

    • Reversing Skin Cancer Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism [PDF]
      Y. Wang, Y. Li, Z. Shen and Y. Qiao.
      Computers in Biology and Medicine (2023).

    • Continuous Conditional Generative Adversarial Networks for Image Generation: Novel Losses and Label Input Mechanisms [PDF]
      X. Ding, Y. Wang † , Z. Xu, W. J. Welch and Z. J. Wang.
      IEEE TPAMI (2023).

    • SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images [PDF]
      Y. Wang, Y. Wang, J. Cai, TK. Lee, C. Miao and Z. J. Wang.
      Medical Image Analysis (2023).

    • Distilling and Transferring Knowledge via cGAN-generated Samples for Image Classification and Regression [PDF]
      X. Ding, Y. Wang † , Z. Xu, Z. J. Wang and W. J. Welch.
      Expert Systems With Applications (2023).

    • Polarization-sensitive Optical Coherence Tomography with Deep Learning for Detecting the Local Distribution of Osteoarthritis Severities [PDF]
      X. Zhou, Y. Wang, F. Eltit, L. Lu, S. Maloufi, Q. Wang, L. Huang, C. Jones, R. Wang, Z. J. Wang and S. Tang.
      Under review (2022).

    • Efficient Subsampling of Realistic Images From GANs Conditional on a Class or a Continuous Variable [PDF]
      X. Ding, Y. Wang † , Z. J. Wang and W. J. Welch.
      Neurocomputing (2022).

    • Video Splicing Detection and Localization based on Multi-level Deep Feature Fusion and Reinforcement Learning [PDF]
      X. Jin, Z. He, Y. Wang and Y. Su.
      Multimedia Tools and Applications (2022).

    • FCMNet: Frequency-Aware Cross-Modality Attention Networks for RGB-D Salient Object Detection [PDF]
      X. Jin, Z. He, J. Xu, Y. Wang and Y. Su.
      Neurocomputing (2022).

    • Towards general object-based video forgery detection via dual-stream networks and depth information embedding [PDF]
      X. Jin, Z. He, Y. Wang, J. Yu and J. Xu.
      Multimedia Tools and Applications (2021): 1-17.

    • Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection [PDF]
      Y. Wang, X. Ding, Y. Yang, L. Ding, R. Ward and Z. J. Wang.
      Pattern Recognition Letters (2021): 15-22.

    • Coarse-to-fine Image Dehashing using Deep Pyramidal Residual Learning [PDF]
      Y. Wang, R. Ward and Z. J. Wang.
      IEEE Signal Processing Letters (2019): 1295-1299.

    • RevHashNet: Perceptually De-hashing Real-valued Image Hashes for Similarity Retrieval [PDF]
      Y. Wang, H. Palangi, Z. J. Wang and H. Wang.
      Signal Processing: Image Communication (2018): 68-75.


  • Conferences

    (*=Equal contribution, alphabetical order)
    • HGAttack: Transferable Heterogeneous Graph Adversarial Attack [PDF]
      H. Zhao, Z. Zeng, Y. Wang, D. Ye and C. Miao.
      Under review (2024).

    • Certified Robustness on Visual Graph Matching via Searching Optimal Smoothing Range [PDF]
      H. Shao, L. Wang, Y. Wang, Q. Ren and J. Yan.
      Under review (2024).

    • Accurate and Explainable Cataract Detection Using Eye Images Taken by Hand-held Slit-lamp Cameras [PDF]
      D. Fung, D. Wang, H. Wang, Y. Wang, P. Wu, YY. Hah, CC. Yip, WJ. Heng, TH. Lim, C. Leung and C. Miao.
      IEEE CAI (2024).

    • Active Retrosynthetic Planning Aware of Route Quality [PDF]
      L. Yuan, Y. Yu, Y. Wei †, Y. Wang †, Z. Wang and F. Wu †.
      ICLR (2024).

    • Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks [PDF]
      X. Ding, Y. Wang † and Z. Xu.
      AAAI (2024).

    • FedCIO: Efficient Exact Federated Unlearning with Clustering, Isolation, and One-shot Aggregation [PDF]
      H. Qiu, Y. Wang, Y. Xu, L. Cui and Z. Shen.
      IEEE BigData (2023).

    • Distribution Alignment for Privacy-Preserving Federated Cross-Domain Recommendation [PDF]
      Z. Sun, Y. Wang, Y. Xu, Y. Jiang and L. Cui.
      Under Review (2023).

    • Device-Cloud Collaboration Personalized Click-Through Rate Prediction Framework [PDF]
      Z. Lv, W. Zhang, S. Zhang, K. Kuang, Z. Chen, Y. Wang, W. Fan and F. Wu.
      Under Review (2023).

    • DUET: A Tuning-Free Device-Cloud Collaborative Parameters Generation Framework for Efficient Device Model Generalization [PDF]
      Z. Lv, W. Zhang, S. Zhang, K. Kuang, F. Wang, Y. Wang, Z. Chen, T. Shen, H. Yang, B. C. Ooi and F. Wu.
      WWW (2023).

    • Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective [PDF]
      Y. Wang, Y. Liu and Z. Shen.
      AAAI (2023).

    • Mining Latent Graph Topology Information Improves Heterogeneous Graph Representation Learning [PDF]
      H. Zhao, Y. Wang, Z. Zeng and C. Miao.
      Under review (2023).

    • Decrypting the Chao-based Image Encryption via A Deep Autoencoding Approach [PDF]
      Y. Wang, K. Ming, C. He and Z. J. Wang.
      ICCBDAI (2023).

    • Imperceptible Backdoor Attack by Adversarial Examples [PDF]
      J. Zhao, Z. Wang, Y. Wang and L. Wang.
      Under review (2022).

    • Certified Robustness on Structural Graph Matching [PDF]
      H. Shao, L. Wang, Y. Wang, Q. Ren and J. Yan.
      Under review (2022).

    • Reaching A Better Trade-off between Image Quality and Attack Success Rates in Transfer-based Adversarial Attacks [PDF]
      Y. Wang, L. Wang, M. Feng, R. Ward and Z. J. Wang.
      IEEE DSLW (2022).

    • Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework [PDF]
      L. Ding*, Y. Wang* (alphabet. order), X. Ding, K. Yuan, P. Fu, H. Huang and Z. J. Wang.
      ACM Multimedia (2021): 4564-4572.

    • Object-based Video Forgery Detection via Dual-stream Networks [PDF]
      X. Jin, Z. He, J. Xu †, Y. Wang † and Y. Su.
      ICME (2021): 1-6.

    • CcGAN: Continuous Conditional Generative Adversarial Networks for Image Generation [PDF]
      X. Ding*, Y. Wang* , Z. Xu, W. J. Welch and Z. J. Wang.
      ICLR (2021): 1-10.

    • Towards Universal Physical Attacks on Single Object Tracking [PDF]
      L. Ding*, Y. Wang* (alphabet. order), K. Yuan, M. Jiang, P. Fu, H. Huang and Z. J. Wang.
      AAAI (2021): 236-1245.

    • Image Inpainting Detection Based on a Modified Formulation of Canonical Correlation Analysis [PDF]
      X. Jin, Y. Su, Y. Wang and Z. J. Wang.
      MMSP (2018): 1-5.

    • Localization of Underwater Tone Noise Sources by a Small Aperture Circular Array [PDF]
      L. Xu, Y. Yang, Y. Wang and H. Yang.
      OCEANS (2015): 1-5.

    • Robust Sparse Underwater Acoustic Channel Estimation Method via Projected l1-l2 Optimization [PDF]
      Y. Wang, Y. Yang, L. Xu and X. Bai.
      OCEANS (2015): 1-5.