Ronghua Wang

Orcid: 0000-0002-9128-1340

According to our database1, Ronghua Wang authored at least 16 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Line-Of-Sight guidance law based on vector fields path following for underactuated unmanned surface vehicle.
CoRR, 2024

2023
MCSC-UTNet: Honeycomb lung segmentation algorithm based on Separable Vision Transformer and context feature fusion.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
A 12-Bit Current-Steering DAC With Unary- Splitting -Binary Segmented Architecture and Improved Decoding Circuit Topology.
IEEE Trans. Very Large Scale Integr. Syst., 2022

2020
Influence Analysis Model of Clean Energy Grid-Connected Generation to Transmission and Distribution Price.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

2019
Statistical Analysis of Two-Parameter Generalized BS-Logistic Fatigue Life Distribution.
J. Syst. Sci. Complex., 2019

2018
Reliability statistical analysis about products of Birnbaum-Saunders fatigue life distribution for life test and progressive stress accelerated life test.
Commun. Stat. Simul. Comput., 2018

2017
A 0.6 V 10 bit 120 kS/s SAR ADC for implantable multichannel neural recording.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, 2017

2015
Parameter Inference in a Hybrid System With Masked Data.
IEEE Trans. Reliab., 2015

2012
Comparison Analysis of Efficiency for Step-Down and Step-Up Stress Accelerated Life Testing.
IEEE Trans. Reliab., 2012

Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012

2009
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2009

2008
SEED: A Suite of Instructional Laboratories for Computer Security Education.
ACM J. Educ. Resour. Comput., 2008

2007
SEED: a suite of instructional laboratories for computer SEcurity EDucation.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Containing denial-of-service attacks in broadcast authentication in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2005
Managing XML Documents Using RDBMS.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

An efficient scheme for authenticating public keys in sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005


  Loading...