Mengya Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Cross-Modal Object Tracking via Modality-Aware Fusion Network and a Large-Scale Dataset.
IEEE Trans. Neural Networks Learn. Syst., April, 2025

Demystifying Private Transactions and Their Impact in PoW and PoS Ethereum.
CoRR, March, 2025

An Evolutionary Game Study of Consumers' Low-Carbon Travel Behavior Under Carbon-Inclusive Policy.
Expert Syst. J. Knowl. Eng., February, 2025

Optimization of machine configuration and scheduling in the hybrid flow shop using a linear programming-driven evolutionary approach.
Robotics Comput. Integr. Manuf., 2025

A particle swarm optimization and constraint programming-based approach for integrated process planning and scheduling with lot streaming problem.
Appl. Soft Comput., 2025

Constraint programming-based layered method for integrated process planning and scheduling in extensive flexible manufacturing.
Adv. Eng. Informatics, 2025

An Empirical Study of Proxy Contracts at the Ethereum Ecosystem Scale.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

Automatic Strategy Selection Based on Graph Neural Network for Constraint Programming on the Shop Scheduling.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
Mobile-Aware Service Offloading for UAV-Assisted IoV: A Multiagent Tiny Distributed Learning Approach.
IEEE Internet Things J., June, 2024

DSMN: An Improved Recommendation Model for Capturing the Multiplicity and Dynamics of Consumer Interests.
IEEE Trans. Consumer Electron., February, 2024

Energy-Efficient Computing Acceleration of Unmanned Aerial Vehicles Based on a CPU/FPGA/NPU Heterogeneous System.
IEEE Internet Things J., 2024

Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum.
CoRR, 2024

Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Joint RGB-Spectral Decomposition Model Guided Image Enhancement in Mobile Photography.
Proceedings of the Computer Vision - ECCV 2024, 2024

Multi-teacher Knowledge Distillation with Triplet Loss for Cross-Modal Object Tracking.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2024

Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
CoRR, 2023

Reusable Enclaves for Confidential Serverless Computing.
Proceedings of the 32nd USENIX Security Symposium, 2023

A unified binary classification network for weld image detection.
Proceedings of the 8th International Conference on Control, Robotics and Cybernetics, 2023

2022
Constrained-SIoU: A Metric for Horizontal Candidates in Multi-Oriented Object Detection.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Scientific elites versus other scientists: who are better at taking advantage of the research collaboration network?
Scientometrics, 2022

Research on named entity recognition of chinese electronic medical records based on multi-head attention mechanism and character-word information fusion.
J. Intell. Fuzzy Syst., 2022

A spiking network model for clustering report in a visual working memory task.
Frontiers Comput. Neurosci., 2022

An Empirical Study on Ethereum Private Transactions and the Security Implications.
CoRR, 2022

2021
Chinese Medical Entity Recognition Model Based on Character and Word Vector Fusion.
Sci. Program., 2021

3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization.
Digit. Commun. Networks, 2021

2020
Scientists' genders and international academic collaboration: An empirical study of Chinese universities and research institutes.
J. Informetrics, 2020

Neural mechanism underlying risk attitude and probability distortion: One two-stage model of valuation and choice.
Neurocomputing, 2020

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

A Real-Time Impedance Measurement System for EEG Based on Embedded System.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
Virtual Antenna Array and Fractional Fourier Transform-Based TOA Estimation for Wireless Positioning.
Sensors, 2019

Triplet-Based Semantic Relation Learning for Aerial Remote Sensing Image Change Detection.
IEEE Geosci. Remote. Sens. Lett., 2019


  Loading...