Junyuan Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Towards Load-Balanced Clustered Cell-Free Networking: A Tight Relaxation Approach.
Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), 2025

2024
An Integrated Pipeline for Phenotypic Characterization, Clustering and Visualization of Patient Cohorts in a Rare Disease-Oriented Clinical Data Warehouse.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024

Tight Differentiable Relaxation of Sum Ergodic Capacity Maximization for Clustered Cell-Free Networking.
Proceedings of the IEEE International Symposium on Information Theory, 2024

vCrypto: a Unified Para-Virtualization Framework for Heterogeneous Cryptographic Resources.
Proceedings of the IEEE INFOCOM 2024, 2024

Multi-Attribute Dynamic Learning for 3D Face Reconstruction and Dense Alignment in the Unconstrained Environment.
Proceedings of the International Joint Conference on Neural Networks, 2024

A Sequential Min K-Cut Approach for Sum Rate Maximization of Clustered Cell-Free Networking.
Proceedings of the IEEE International Conference on Communications, 2024

Double Splitting Model and Generalized Moment Passing Method for Network Capacity Computation.
Proceedings of the IEEE International Conference on Communications, 2024

Learning-Based Estimate-then-Predict Channel Tracking for Cellular-Connected UAV.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

A Sequential Max K-Cut Approach for Pilot Assignment in Cell-Free Networks.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2023

Utilizing Latent Codes for Minting AI-Generated Digital Assets into NFTs.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2019
WGM: Wavelet-Based Gamma Model for Video Traffic in Wireless Multi-hop Networks.
Wirel. Pers. Commun., 2019

2018
Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2016
A study of HSM based key protection in encryption file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2008
Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks.
Int. J. Commun. Netw. Syst. Sci., 2008


  Loading...