Dongxia Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution.
CoRR, 2024

2023
A Neural Network-Based Method for Surface Metallization of Polymer Materials.
J. Circuits Syst. Comput., August, 2023

2022
A Method of Whole-Network Adjustment for Clock Offset Based on Satellite-Ground and Inter-Satellite Link Observations.
Remote. Sens., 2022

Preliminary Analysis and Evaluation of BDS-3 RDSS Timing Performance.
Remote. Sens., 2022

Uncertainty Evaluation of Circularity Error Measurement Based on Coordinate Measuring Machine.
Proceedings of the RobCE 2022: 2nd International Conference on Robotics and Control Engineering, Nanjing, China, March 25, 2022

Automatic Grading of Student Code with Similarity Measurement.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

An Efficient Smoke Detection Approach Based on Dual-Channel Neural Network.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

Distributed ADMM Based on Sparse Computation and Allreduce Communication.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Convex Hull Convolutive Non-negative Matrix Factorization Based Speech Enhancement For Multimedia Communication.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
A Comparison of Code Embeddings and Beyond.
CoRR, 2021

2016
Improved shifted robust soliton distribution.
IET Commun., 2016

Empirical Study of Phase Transition of Hamiltonian Cycle Problem in Random Graphs with Degrees Greater Than One.
Proceedings of the Frontiers in Algorithmics, 10th International Workshop, 2016

2015
Quantifying and Improving the Robustness of Trust Systems.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2008
Data-Flow Based Analysis of Java Bytecode Vulnerability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...