Chunling Wang

Orcid: 0009-0007-2375-797X

According to our database1, Chunling Wang authored at least 26 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adversarial Distillation Adaptation Model with Sentiment Contrastive Learning for Zero-Shot Stance Detection.
Int. J. Comput. Intell. Syst., December, 2023

Multi-Perspective Semantic Enhanced Model for Heterogeneous Graph Embedding with Contrastive Learning.
Proceedings of the International Conference on Frontiers of Artificial Intelligence and Machine Learning, 2023

International Public Opinion Analysis in COVID-19 Pandemic from Mainstream and Social Media.
Proceedings of the 6th International Conference on Data Science and Information Technology, 2023

Adversarial Network with External Knowledge for Zero-Shot Stance Detection.
Proceedings of the Chinese Computational Linguistics - 22nd China National Conference, 2023

An Empirical Analysis of Just-in-Time Compilation in Modern Databases.
Proceedings of the Databases Theory and Applications, 2023

2022
Detecting Mountain Forest Dynamics in the Eastern Himalayas.
Remote. Sens., 2022

Investigation of Long-Term Forest Dynamics in Protected Areas of Northeast China Using Landsat Data.
Remote. Sens., 2022

Estimation of Daily and Instantaneous Near-Surface Air Temperature from MODIS Data Using Machine Learning Methods in the Jingjinji Area of China.
Remote. Sens., 2022

A Study of Fatigue Driving Detection System Based on AdaBoost Algorithm.
Proceedings of the 4th International Conference on Artificial Intelligence and Advanced Manufacturing, 2022

2021
Detecting Rock Glacier Displacement in the Central Himalayas Using Multi-Temporal InSAR.
Remote. Sens., 2021

Optimal Scheduling of Integrated Demand Response-Enabled Integrated Energy Systems with Uncertain Renewable Generations: A Stackelberg Game Approach.
CoRR, 2021

Design of Coal Mine Safety Monitoring System Based on Multi-Agent.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Design and Realization of Anti-scratch System on Vehicle Bottom Based on 51 Single-chip Microcomputer.
Proceedings of the EEET 2021: 4th International Conference on Electronics and Electrical Engineering Technology, Nanjing, China, December 3, 2021

2020
Improving operational flexibility of integrated energy system with uncertain renewable generations considering thermal inertia of buildings.
CoRR, 2020

2018
A tree cognitive navigation system based on two-dimensional code and GPS.
Int. J. Inf. Technol. Manag., 2018

2015
ETD-Cache: an expiration-time driven cache scheme to make SSD-based read cache endurable and cost-efficient.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
Optimal Treatment Strategies for HIV with Antibody Response.
J. Appl. Math., 2014

The influence of cognitive conflict on the result of collaborative editing in Wikipedia.
Behav. Inf. Technol., 2014

SSD-Aware Temporary Data Management Policy for Improving Query Performance.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

2013
A fault diagnosis method of Smart Grid based on rough sets combined with genetic algorithm and tabu search.
Neural Comput. Appl., 2013

2011
Design of Koji Making Disc Machine Control System in Soy Sauce.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

An Interactive Charge Scheme with Reward and Non-repudiation.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

The Order Measure Model of Knowledge Structure.
Proceedings of the Brain Informatics - International Conference, 2011

2010
A Study of Mutual Authentication for P2P Trust Management.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2005
Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

2001
Using SMV for Cryptographic Protocol Analysis: A Case Study.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...