default search action
Wenyong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Xiaorui Bai, Wenyong Wang, Jun Zhang, Yueqing Wang, Yu Xiang:
Novel deep learning methods for 3D flow field segmentation and classification. Expert Syst. Appl. 251: 124080 (2024) - [j45]Changshui Yang, Yan Liu, Qiang Liu, Chi Zhang, Wenyong Wang:
Joint frame-level and CTU-level rate control based on constant perceptual quality. Multim. Syst. 30(3): 133 (2024) - [j44]Wenyong Wang, Yuanzheng Cai, Zhiming Luo, Wei Liu, Tao Wang, Zuoyong Li:
SA3Det: Detecting Rotated Objects via Pixel-Level Attention and Adaptive Labels Assignment. Remote. Sens. 16(13): 2496 (2024) - [j43]Wenyong Wang, Qunhai Huo, Qiran Liu, Jianfu Ni, Jinda Zhu, Tongzhen Wei:
Energy Optimal Dispatching of Ports Multi-Energy Integrated System Considering Optimal Carbon Flow. IEEE Trans. Intell. Transp. Syst. 25(5): 4181-4191 (2024) - [i12]Liwei Hu, Wenyong Wang, Yu Xiang, Stefan Sommer:
Incorporating Riemannian Geometric Features for Learning Coefficient of Pressure Distributions on Airplane Wings. CoRR abs/2401.09452 (2024) - [i11]Zihao Chen, Wenyong Wang, Yu Xiang:
Isometric Immersion Learning with Riemannian Geometry. CoRR abs/2409.14760 (2024) - 2023
- [j42]Luyao Chen, Yong Tang, Jingwen Xia, Siyang Chen, Chengyu Zheng, Hai Lin, Wenyong Wang:
Multi-MEC collaboration for VR video transmission: Architecture and cache algorithm design. Comput. Networks 234: 109864 (2023) - [j41]Junrui Wu, Wenyong Wang, Sai Zou, Wei Ni, Lisheng Huang, Yong Tang:
Can Video as a Service Paradigm Lead to the Future Internet of Video Things? Computer 56(11): 73-84 (2023) - [j40]Changshui Yang, Yan Liu, Qiang Liu, Riaz Ullah Khan, Bin Chen, Wenyong Wang:
Dual semantic-aligned clustering for cross-domain person re-identification. Multim. Syst. 29(4): 2351-2362 (2023) - [j39]Yu Wang, Wenyong Wang, Youlu Zeng, Ting Yang:
GradingShard: A new sharding protocol to improve blockchain throughput. Peer Peer Netw. Appl. 16(3): 1327-1339 (2023) - [j38]Yu Xiang, Liwei Hu, Guangbo Zhang, Jun Zhang, Wenyong Wang:
A Manifold-Based Airfoil Geometric-Feature Extraction and Discrepant Data Fusion Learning Method. IEEE Trans. Aerosp. Electron. Syst. 59(5): 6555-6569 (2023) - [c25]Haisheng Yu, Rajesh Kumar, Wenyong Wang, Ji Zhang, Zhifeng Liu, Sai Zou, Jiangchuan Yang, Leong Io Hon:
Intelligent Collaborative Control of Multi-source Heterogeneous Data Streams for Low-Power IoT: A Flow Machine Learning Approach. ICA3PP (4) 2023: 359-377 - [c24]Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi:
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. ICISSP 2023: 651-658 - [c23]Haoming Li, Yu Xiang, Haodong Xu, Wenyong Wang:
Pedestrian Recognition with Radar Data-Enhanced Deep Learning Approach Based on Micro-Doppler Signatures. ICTAI 2023: 437-443 - [c22]Luyao Chen, Yong Tang, Siyang Chen, Jingwen Xia, Ting Yang, Wenyong Wang:
Beyond the Field of View: Neglected Audio Part in VR Video Transmission Frameworks. LCN 2023: 1-4 - [c21]Wenxuan Wang, Wenyong Wang, Bochun Wu, Sai Zou, Haisheng Yu, Wei Ni, Ji Zhang:
Qmix-Based Cross-Domain Transmission Routing for Time-Sensitive and Deterministic Networks. SPAWC 2023: 226-230 - [i10]Jingwen Xia, Luyao Chen, Yong Tang, Ting Yang, Wenyong Wang:
Multi-MEC Cooperation Based VR Video Transmission and Cache using K-Shortest Paths Optimization. CoRR abs/2303.04626 (2023) - [i9]Xiaorui Bai, Wenyong Wang, Jun Zhang, Yueqing Wang, Yu Xiang:
Novel deep learning methods for 3D flow field segmentation and classification. CoRR abs/2305.11884 (2023) - [i8]Haoming Li, Yu Xiang, Haodong Xu, Wenyong Wang:
Pedestrian Recognition with Radar Data-Enhanced Deep Learning Approach Based on Micro-Doppler Signatures. CoRR abs/2306.08303 (2023) - 2022
- [j37]Junrui Wu, Wenyong Wang, Lisheng Huang, Fengjun Zhang:
Intrusion detection technique based on flow aggregation and latent semantic analysis. Appl. Soft Comput. 127: 109375 (2022) - [j36]Yan Liu, Haisheng Yu, Wenyong Wang, Sai Zou, Dong Liu, Daobiao Gong, Zhen Li:
A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS. Comput. J. 65(11): 2880-2893 (2022) - [j35]Xiangyu Wang, Wenyong Wang, Youlu Zeng, Ting Yang, Chengyu Zheng:
A state sharding model on the blockchain. Clust. Comput. 25(3): 1969-1979 (2022) - [j34]Sai Zou, Wenyong Wang, Wei Ni, Lei Wang, Yuliang Tang:
Efficient Orchestration of Virtualization Resource in RAN Based on Chemical Reaction Optimization and Q-Learning. IEEE Internet Things J. 9(5): 3383-3396 (2022) - [j33]Sai Zou, Haisheng Yu, Wenyong Wang, Wei Ni:
An Energy-Efficient Framework in Radio Multi-Access Edge Cloud by Automatically Generating Network Slice. IEEE Internet Things Mag. 5(3): 128-133 (2022) - [j32]Haisheng Yu, Zhixian Liu, Sai Zou, Wenyong Wang:
CPACK: An Intelligent Cyber-Physical Access Control Kit for Protecting Network. Sensors 22(20): 8014 (2022) - [j31]Liwei Hu, Wenyong Wang, Yu Xiang, Jun Zhang:
Flow Field Reconstructions With GANs Based on Radial Basis Functions. IEEE Trans. Aerosp. Electron. Syst. 58(4): 3460-3476 (2022) - [c20]Yu Xiang, Yu Huang, Haodong Xu, Guangbo Zhang, Wenyong Wang:
A Multi-Characteristic Learning Method with Micro-Doppler Signatures for Pedestrian Identification. ITSC 2022: 3794-3799 - [c19]Jingwen Xia, Luyao Chen, Yong Tang, Ting Yang, Wenyong Wang:
Multi-MEC Cooperation Based VR Video Transmission and Cache Using K-Shortest Paths Optimization. MobiQuitous 2022: 334-355 - [c18]Haisheng Yu, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong:
Cache Top-level domain locally: make DNS respond quickly in mobile network. TrustCom 2022: 1205-1210 - [i7]Yu Xiang, Yu Huang, Haodong Xu, Guangbo Zhang, Wenyong Wang:
A Multi-Characteristic Learning Method with Micro-Doppler Signatures for Pedestrian Identification. CoRR abs/2203.12236 (2022) - [i6]Yu Xiang, Guangbo Zhang, Liwei Hu, Jun Zhang, Wenyong Wang:
A Manifold-based Airfoil Geometric-feature Extraction and Discrepant Data Fusion Learning Method. CoRR abs/2206.12254 (2022) - 2021
- [j30]Rajesh Kumar, Wenyong Wang, Jay Kumar, Ting Yang, Abdullah Aman Khan, Wazir Ali, Ikram Ali:
An Integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Comput. Medical Imaging Graph. 87: 101812 (2021) - [j29]Lisheng Huang, Jinye Ran, Wenyong Wang, Tan Yang, Yu Xiang:
A multi-channel anomaly detection method with feature selection and multi-scale analysis. Comput. Networks 185: 107645 (2021) - [j28]Kun Zhou, Wenyong Wang, Teng Hu, Kai Deng:
Application of Improved Asynchronous Advantage Actor Critic Reinforcement Learning Model on Anomaly Detection. Entropy 23(3): 274 (2021) - [j27]Kun Zhou, Wenyong Wang, Lisheng Huang, Baoyang Liu:
Comparative study on the time series forecasting of web traffic based on statistical model and Generative Adversarial model. Knowl. Based Syst. 213: 106467 (2021) - [j26]Ziyan Yang, Haibo Mei, Wenyong Wang, Dongdai Zhou, Kun Yang:
Joint resource allocation for emotional 5G IoT systems using deep reinforcement learning. Int. J. Mach. Learn. Cybern. 12(12): 3517-3528 (2021) - [j25]Jiancheng Fang, Yu Xiang, Yu Huang, Yilong Cui, Wenyong Wang:
A Vehicle Control Model to Alleviate Traffic Instability. IEEE Trans. Veh. Technol. 70(10): 9863-9876 (2021) - [c17]Ye Zhang, Yong Tang, Wenyong Wang:
Service Deployment and Service Request Optimization Scheduling in MEC enabled LEO Networks. ICCCN 2021: 1-6 - [c16]Haisheng Yu, Wenyong Wang, Yan Liu, Lihong Cheng, Sai Zou:
A Simplified and Effective Solution for Hybrid SDN Network Deployment. NSS 2021: 148-161 - [c15]Haisheng Yu, Dong Liu, Wenyong Wang, Keqiu Li, Sai Zou, Zhaobin Liu, Yan Liu:
An User-Driven Active Way to Push ACL in Software-Defined Networking. PDCAT 2021: 113-120 - [c14]Yikuan Xie, Wenyong Wang, Mingqian Du, Qing He:
Transformer with Syntactic Position Encoding for Machine Translation. RANLP 2021: 1536-1544 - [i5]Jiancheng Fang, Yu Xiang, Yu Huang, Yilong Cui, Wenyong Wang:
A Vehicles Control Model to Alleviate Traffic Instability. CoRR abs/2101.05998 (2021) - [i4]Rajesh Kumar, Wenyong Wang, Jay Kumar, Zakria, Ting Yang, Waqar Ali, Abubackar Sharif:
IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology. CoRR abs/2102.13376 (2021) - [i3]Rajesh Kumar, Wenyong Wang, Cheng Yuan, Jay Kumar, Zakria, He Qing, Ting Yang, Abdullah Aman Khan:
Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties. CoRR abs/2104.10903 (2021) - 2020
- [j24]Liwei Hu, Jun Zhang, Yu Xiang, Wenyong Wang:
Neural Networks-Based Aerodynamic Data Modeling: A Comprehensive Review. IEEE Access 8: 90805-90823 (2020) - [j23]Wenyong Wang, Yongcheng Cui, Guangshun Li, Chuntao Jiang, Song Deng:
A self-attention-based destruction and construction learning fine-grained image classification method for retail product recognition. Neural Comput. Appl. 32(18): 14613-14622 (2020) - [j22]Cong Yang, Gilles Simon, John See, Marie-Odile Berger, Wenyong Wang:
WatchPose: A View-Aware Approach for Camera Pose Data Collection in Industrial Environments. Sensors 20(11): 3045 (2020) - [j21]Kun Zhou, Wenyong Wang, Teng Hu, Kai Deng:
Time Series Forecasting and Classification Models Based on Recurrent with Attention Mechanism and Generative Adversarial Networks. Sensors 20(24): 7211 (2020) - [j20]Yu Xiang, Sida Huang, Min Li, Jin Li, Wenyong Wang:
Rear-End Collision Avoidance-Based on Multi-Channel Detection. IEEE Trans. Intell. Transp. Syst. 21(8): 3525-3535 (2020) - [i2]Rajesh Kumar, Abdullah Aman Khan, Sinmin Zhang, Wenyong Wang, Yousif Abuidris, Waqas Amin, Jay Kumar:
Blockchain-Federated-Learning and Deep Learning Models for COVID-19 detection using CT Imaging. CoRR abs/2007.06537 (2020) - [i1]Liwei Hu, Wenyong Wang, Yu Xiang, Jun Zhang:
Flow Field Reconstructions with GANs based on Radial Basis Functions. CoRR abs/2009.02285 (2020)
2010 – 2019
- 2019
- [j19]Rajesh Kumar, Xiaosong Zhang, Wenyong Wang, Riaz Ullah Khan, Jay Kumar, Abubaker Sharif:
A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features. IEEE Access 7: 64411-64430 (2019) - [j18]Ziyan Yang, Yao Du, Chang Che, Wenyong Wang, Haibo Mei, Dongdai Zhou, Kun Yang:
Energy-Efficient Joint Resource Allocation Algorithms for MEC-Enabled Emotional Computing in Urban Communities. IEEE Access 7: 137410-137419 (2019) - [j17]Jin Li, Yu Xiang, Jiancheng Fang, Wenyong Wang, Yiming Pi:
Research on Multiple Sensors Vehicle Detection With EMD-Based Denoising. IEEE Internet Things J. 6(4): 6262-6270 (2019) - [j16]Yaonan Shan, Kun She, Shouming Zhong, Jun Cheng, Wenyong Wang, Can Zhao:
Event-triggered passive control for Markovian jump discrete-time systems with incomplete transition probability and unreliable channels. J. Frankl. Inst. 356(15): 8093-8117 (2019) - [j15]Farah Deeba, She Kun, Wenyong Wang, Junaid Ahmed, Bahzad Qadir:
Wavelet integrated residual dictionary training for single image super-resolution. Multim. Tools Appl. 78(19): 27683-27701 (2019) - [j14]Martin Konan, Wenyong Wang:
A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN. Sensors 19(7): 1608 (2019) - [c13]Yu Xiang, Jinye Ran, Lisheng Huang, Chao Yang, Wenyong Wang:
A Traffic Anomaly Detection Method based on Multi-scale Decomposition and Multi-Channel Detector. ANCS 2019: 1-6 - 2018
- [j13]Yu Xiang, Ling Gou, Lihua He, Shoulu Xia, Wenyong Wang:
A SVR-ANN combined model based on ensemble EMD for rainfall prediction. Appl. Soft Comput. 73: 874-883 (2018) - [j12]Martin Konan, Wenyong Wang:
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω). Int. J. Inf. Secur. Priv. 12(4): 1-23 (2018) - 2017
- [j11]Chuan Liu, Wenyong Wang, Meng Wang, Fengmao Lv, Martin Konan:
An efficient instance selection algorithm to reconstruct training set for support vector machine. Knowl. Based Syst. 116: 58-73 (2017) - [j10]Chuan Liu, Wenyong Wang, Martin Konan, Siyang Wang, Lisheng Huang, Yong Tang, Xiang Zhang:
A new validity index of feature subset for evaluating the dimensionality reduction algorithms. Knowl. Based Syst. 121: 83-98 (2017) - [j9]Chuan Liu, Wenyong Wang, Guanghui Tu, Yu Xiang, Siyang Wang, Fengmao Lv:
A new Centroid-Based Classification model for text categorization. Knowl. Based Syst. 136: 15-26 (2017) - [j8]Chuan Liu, Wenyong Wang, Qiang Zhao, Xiaoming Shen, Martin Konan:
A new feature selection method based on a validity index of feature subset. Pattern Recognit. Lett. 92: 1-8 (2017) - 2016
- [c12]Martin Konan, Wenyong Wang, Brighter Agyemang:
Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving". CSCloud 2016: 66-74 - 2015
- [j7]Jun Zhang, Yong Tang, Zhang Jun, Wenyong Wang:
A layer-based algorithm for the construction of connected dominating set in WSNs. Int. J. Auton. Adapt. Commun. Syst. 8(2/3): 320-331 (2015) - 2013
- [j6]Sai Zou, Wei Wang, Wenyong Wang:
A routing algorithm on delay-tolerant of wireless sensor network based on the node selfishness. EURASIP J. Wirel. Commun. Netw. 2013: 212 (2013) - 2012
- [j5]Jun Zhang, Yu Xiang, Xiaojuan Liu, Wenyong Wang, Yong Tang:
An Energy-Efficient Distributed Algorithm for Virtual Backbone Construction with Cellular Structure in WSN. Int. J. Distributed Sens. Networks 8 (2012) - [j4]Wenyong Wang, Jun Zhang, Yong Tang, Yu Xiang, Ting Yang:
Leveraging 1-hop Neighborhood Knowledge for Connected Dominating Set in Wireless Sensor Networks. J. Comput. 7(1): 11-18 (2012) - [j3]Hao Yu, Carrick M. Eggleston, Jiajun Chen, Wenyong Wang, Qilin Dai, Jinke Tang:
Optical Waveguide Lightmode Spectroscopy (OWLS) as a Sensor for Thin Film and Quantum Dot Corrosion. Sensors 12(12): 17330-17342 (2012) - 2010
- [j2]Fang Yao, Wenyong Wang, Shaochun Zhong, Ye Tian, Yang Chang, Runtao Gong:
Construction and Visualization of Wheat Roots Model Based on Artificial Life. J. Softw. 5(1): 107-114 (2010) - [c11]Wenyong Wang, Jun Zhang, Yong Tang, Yu Xiang, Ting Yang:
One-Hop Neighbor Transmission Coverage Information Based Distributed Algorithm for Connected Dominating Set. PAAP 2010: 15-21
2000 – 2009
- 2009
- [c10]Yu Xiang, Xiaosong Xin, Wenyong Wang:
Priority-based low-power task scheduling for wireless sensor network. ISADS 2009: 305-310 - 2008
- [c9]Lisheng Huang, Wenyong Wang, Mingtian Zhou:
Estimating Half-Path RTT in Backbone Network. APNOMS 2008: 511-514 - [c8]Wenwen Liang, Mingxin Qin, Mingke Jiao, Hao Yang, Ke Li, Teng Jiao, Liyuan Bai, Wenyong Wang:
Phase Detection Based on the Lock-in Amplifier SR844 and Experiments of Brain Neuron Cells in MIT System. BMEI (1) 2008: 638-642 - 2006
- [c7]Xiao-Lin Quan, Shaochun Zhong, Wenyong Wang, Qian Xu, Ying Liang, Qingrong Zhang:
Modeling of Artificial Life Based Virtual Fish Behavior. ICAT Workshops 2006: 213-216 - [c6]Qingrong Zhang, Wenyong Wang, Shaochun Zhong, Ying Liang, Qian Xu, Xiao-Lin Quan:
Visualization Model of Virtual Plant Growth and its Application. ICAT Workshops 2006: 217-220 - [c5]Qian Xu, Wenyong Wang, Shaochun Zhong, Xiao-Lin Quan, Qingrong Zhang, Ying Liang:
Virtual Clone Fish Experiment. ICAT Workshops 2006: 646-650 - [c4]Ying Liang, Wenyong Wang, Shaochun Zhong, Qingrong Zhang, Yao Wang, Xiao-Lin Quan, Qian Xu:
Virtual Biology Modeling Method Based on Validity Confirmation Mechanism. ICAT 2006: 1118-1127 - [c3]Yumin Wu, Kun Yang, Shaochun Zhong, Wenyong Wang, Jun Shen:
Routing Protocols for an Integrated Cellular and Ad-hoc Network with Flexible Access and Their Overhead Analysis. ICICIC (3) 2006: 681-684 - [c2]Qi Huang, Kaiyu Qin, Wenyong Wang:
A Software Architecture Based on Multi-Agent and Grid Computing for Electric Power System Applications. PARELEC 2006: 405-410 - 2005
- [j1]Wenyong Wang, Takhee Lee, Mark A. Reed:
Electronic Transport in Molecular Self-Assembled Monolayer Devices. Proc. IEEE 93(10): 1815-1824 (2005) - 2003
- [c1]Kun Yang, Xin Guo, Shaochun Zhong, Dongdai Zhou, Wenyong Wang:
Data Securing through Rule-Driven Mobile Agents and IPsec. WAIM 2003: 327-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint