Teng Wu

Orcid: 0000-0002-6924-042X

According to our database1, Teng Wu authored at least 33 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Achieving Energy-Efficient Massive URLLC Over Cell-Free Massive MIMO.
IEEE Internet Things J., January, 2024

Semi-Supervised 3D Shape Segmentation via Self Refining.
IEEE Trans. Image Process., 2024

An evaluation of Deep Learning based stereo dense matching dataset shift from aerial images and a large scale stereo dataset.
CoRR, 2024

2023
Modeling nonlinear flutter behavior of long-span bridges using knowledge-enhanced long short-term memory network.
Comput. Aided Civ. Infrastructure Eng., July, 2023

Accurate Asymptotic Characterization of α-κ-μ Shadowed Fading Channel With Application to Secure URLLC.
IEEE Commun. Lett., April, 2023

Analysis of Massive Ultra-Reliable and Low-Latency Communications Over the κ-μ Shadowed Fading Channel.
IEEE Trans. Commun., March, 2023

Uplink Non-Orthogonal Multiple Access With Statistical Delay Requirement: Effective Capacity, Power Allocation, and α Fairness.
IEEE Trans. Wirel. Commun., 2023

Mobile Mapping Mesh Change Detection and Update.
CoRR, 2023

PSMNet-FusionX3: LiDAR-Guided Deep Learning Stereo Dense Matching On Aerial Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Guaranteeing QoS for NOMA-Enabled URLLC Based on κ-μ Shadowed Fading Model.
Sensors, 2022

Machining Hole Feature Recognition Method and Application for Manufacturability Check.
Proceedings of the ICVARS 2022: The 6th International Conference on Virtual and Augmented Reality Simulations, Brisbane, QLD, Australia, March 25, 2022

Performance Analysis and Optimization Strategy over Cell-Free Massive MIMO in the Finite Blocklength Regime.
Proceedings of the Communications and Networking - 17th EAI International Conference, 2022

2021
A New Recognition Method for the Auditory Evoked Magnetic Fields.
Comput. Intell. Neurosci., 2021

A knowledge-enhanced deep reinforcement learning-based shape optimizer for aerodynamic mitigation of wind-sensitive structures.
Comput. Aided Civ. Infrastructure Eng., 2021

Enabling URLLC under $\kappa-\mu$ Shadowed Fading.
Proceedings of the 28th International Conference on Telecommunications, 2021

Vision-Based Parking Space Detection: A Mask R-CNN Approach.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

2020
Active Magnetic-Field Stabilization with Atomic Magnetometer.
Sensors, 2020

Strong Wind Characteristics and Buffeting Response of a Cable-Stayed Bridge under Construction.
Sensors, 2020

Investigating the automation of building permit checks through 3D GeoBIM information.
CoRR, 2020

2018
Extrinsic Calibration of 2D Laser Rangefinders Using an Existing Cuboid-Shaped Corridor as the Reference.
Sensors, 2018

Accurate Smartphone Indoor Visual Positioning Based on a High-Precision 3D Photorealistic Map.
Sensors, 2018

Extrinsic Calibration of 2D Laser Rangefinders Based on a Mobile Sphere.
Remote. Sens., 2018

Automatic Seam-Line Detection in UAV Remote Sensing Image Mosaicking by Use of Graph Cuts.
ISPRS Int. J. Geo Inf., 2018

Extrinsic Calibration of 2D Laser Rangefinders Using Indoor Geometric Constraints.
Proceedings of the 2018 Ubiquitous Positioning, 2018

Automated large scale indoor reconstruction using vehicle survey data.
Proceedings of the 2018 Ubiquitous Positioning, 2018

A Real-time Indoor Visual Localization and Navigation Method Based on Tango Smartphone.
Proceedings of the 2018 Ubiquitous Positioning, 2018

2016
Two new message authentication codes based on APN functions and stream ciphers.
Secur. Commun. Networks, 2016

Fast and Accurate Plane Segmentation of Airborne LiDAR Point Cloud Using Cross-Line Elements.
Remote. Sens., 2016

Line segment matching: A benchmark.
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

2015
On Message Authentication in 4G LTE System.
PhD thesis, 2015

New Message Authentication Code Based on APN Functions and Stream Ciphers.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
On the Multi-output Filtering Model and Its Applications.
IACR Cryptol. ePrint Arch., 2014

2012
The Weakness of Integrity Protection for LTE.
IACR Cryptol. ePrint Arch., 2012


  Loading...