Weijia Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Circuits Syst. Video Technol., April, 2024
CRADA: Cross Domain Object Detection With Cyclic Reconstruction and Decoupling Adaptation.
IEEE Trans. Multim., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Adaptive Constrained Attitude Control of Spacecraft With Compatible and Guaranteed Performance.
IEEE Trans. Aerosp. Electron. Syst., 2024
IEEE Trans. Aerosp. Electron. Syst., 2024
2023
Comput. Commun., November, 2023
Comput. Graph., November, 2023
Singularity-Avoidance Prescribed Performance Control for Spacecraft Attitude Tracking.
IEEE Trans. Aerosp. Electron. Syst., October, 2023
Integrate design structure matrix with carbon footprint for product low carbon design.
Adv. Eng. Informatics, April, 2023
Real-Time and Continuous Tracking of Total Phosphorus Using a Ground-Based Hyperspectral Proximal Sensing System.
Remote. Sens., January, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Adaptive Reduced Attitude Control for Spacecraft Boresight Alignment under Multiple Constraints with Guaranteed Accuracy.
CoRR, 2023
Composite Triggered Intermittent Control for Constrained Spacecraft Attitude Tracking.
CoRR, 2023
Adaptive Compatible Performance Control for Spacecraft Attitude Control under Motion Constraints with Guaranteed Accuracy.
CoRR, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
The impact of individual perceptual and cognitive factors on collective states in a data-driven fish school model.
PLoS Comput. Biol., 2022
A Convolutional Neural Network-Based Recognition Method of Gear Performance Degradation Mode.
J. Comput. Inf. Sci. Eng., 2022
Event-Triggered Intermittent Prescribed Performance Control for Spacecraft Attitude Reorientation.
CoRR, 2022
Spacecraft Attitude Pointing Control under Pointing Forbidden Constraints with Guaranteed Accuracy.
CoRR, 2022
Robust Control For Spacecraft Attitude Tracking Under Multiple Physical Limitations with Guaranteed Performance.
CoRR, 2022
CoRR, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the 4th International Conference on Blockchain Economics, 2022
An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022
Proceedings of the 11th International Conference on Bioinformatics and Biomedical Science, 2022
2021
PhD thesis, 2021
Research on Multidimensional Image Intelligent Matching Algorithm of Artificial Intelligence Image Recognition Technology.
Mob. Inf. Syst., 2021
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021
2020
Spatial Assessment of Health Economic Losses from Exposure to Ambient Pollutants in China.
Remote. Sens., 2020
Proceedings of the PervasiveHealth '20: 14th EAI International Conference on Pervasive Computing Technologies for Healthcare, 2020
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020
2019
2017
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
2016
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016
2015
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015
2014
Sensors, 2014
Secur. Commun. Networks, 2014
Proceedings of the 14th IEEE-RAS International Conference on Humanoid Robots, 2014
2013
Minimum cost allocation of quality improvement targets under supplier process disruption.
Eur. J. Oper. Res., 2013
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2010
IEEE Commun. Lett., 2010
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006
1993
The Christmas-Tree Switch: An Output Queuing Space-Division Fast Packet Switch Based on Inerleaving Distribution and Concentration Functions.
Comput. Networks ISDN Syst., 1993
1991
The Christmas-Tree Switch: An Output Queueing Space-Division Fast Packet Switch Based on Interleaving Distribution and Concentration Functions.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991