Weijia Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Cross-Shaped Adversarial Patch Attack.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

CRADA: Cross Domain Object Detection With Cyclic Reconstruction and Decoupling Adaptation.
IEEE Trans. Multim., 2024

eLIMInate: a Leakage-focused ISE for Masked Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Adaptive Constrained Attitude Control of Spacecraft With Compatible and Guaranteed Performance.
IEEE Trans. Aerosp. Electron. Syst., 2024

Composite Event-Triggered Intermittent Attitude Control of Spacecraft.
IEEE Trans. Aerosp. Electron. Syst., 2024

2023
FeConDefense: Reversing adversarial attacks via feature consistency loss.
Comput. Commun., November, 2023

Random screening-based feature aggregation for point cloud denoising.
Comput. Graph., November, 2023

Singularity-Avoidance Prescribed Performance Control for Spacecraft Attitude Tracking.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

Integrate design structure matrix with carbon footprint for product low carbon design.
Adv. Eng. Informatics, April, 2023

Real-Time and Continuous Tracking of Total Phosphorus Using a Ground-Based Hyperspectral Proximal Sensing System.
Remote. Sens., January, 2023

Efficient Private Circuits with Precomputation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Safety Guaranteed Control for Spacecraft Inspection Mission.
CoRR, 2023

Adaptive Reduced Attitude Control for Spacecraft Boresight Alignment under Multiple Constraints with Guaranteed Accuracy.
CoRR, 2023

Composite Triggered Intermittent Control for Constrained Spacecraft Attitude Tracking.
CoRR, 2023

Adaptive Compatible Performance Control for Spacecraft Attitude Control under Motion Constraints with Guaranteed Accuracy.
CoRR, 2023

Weighted Point Cloud Normal Estimation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
The impact of individual perceptual and cognitive factors on collective states in a data-driven fish school model.
PLoS Comput. Biol., 2022

A Convolutional Neural Network-Based Recognition Method of Gear Performance Degradation Mode.
J. Comput. Inf. Sci. Eng., 2022

Event-Triggered Intermittent Prescribed Performance Control for Spacecraft Attitude Reorientation.
CoRR, 2022

Spacecraft Attitude Pointing Control under Pointing Forbidden Constraints with Guaranteed Accuracy.
CoRR, 2022

Robust Control For Spacecraft Attitude Tracking Under Multiple Physical Limitations with Guaranteed Performance.
CoRR, 2022

Singularity-Avoidance Prescribed Performance Attitude Tracking of Spacecraft.
CoRR, 2022

A Silkworm Counting Method With Density Map Based on Multiscale Feature Fusion.
Proceedings of the IEEE Smartworld, 2022

Consistency of Automated Market Makers.
Proceedings of the 4th International Conference on Blockchain Economics, 2022

An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Deep Point Cloud Normal Estimation Via Triplet Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Deep Point Cloud Normal Estimation via Triplet Learning (Demonstration).
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022

Brain entrainment by audio-visual gamma frequency stimulations.
Proceedings of the 11th International Conference on Bioinformatics and Biomedical Science, 2022

2021
Towards Intelligent Data Acquisition Systems with Embedded Deep Learning on MPSoC.
PhD thesis, 2021

Research on Multidimensional Image Intelligent Matching Algorithm of Artificial Intelligence Image Recognition Technology.
Mob. Inf. Syst., 2021

AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

2020
Spatial Assessment of Health Economic Losses from Exposure to Ambient Pollutants in China.
Remote. Sens., 2020

Streamlining the Prosthesis Fabrication Process Using 3D Technologies.
Proceedings of the PervasiveHealth '20: 14th EAI International Conference on Pervasive Computing Technologies for Healthcare, 2020

Exploring the Effects of User Control on Social Engagement in Virtual Reality.
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020

2019
Twisted Weak Orders of Coxeter Groups.
Order, 2019

2017
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptol. ePrint Arch., 2017

A security controller-based software defined security architecture.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
A data driven orchestration framework in software defined security.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

2015
Autonomous wall cutting with an Atlas humanoid robot.
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015

2014
A Secure and Efficient Handover Authentication Protocol for Wireless Networks.
Sensors, 2014

A generic homomorphic MAC construction for authentication in network coding.
Secur. Commun. Networks, 2014

Autonomous valve turning with an Atlas humanoid robot.
Proceedings of the 14th IEEE-RAS International Conference on Humanoid Robots, 2014

2013
Minimum cost allocation of quality improvement targets under supplier process disruption.
Eur. J. Oper. Res., 2013

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Evolutionary Algorithm for Portfolio Optimization and Its Application.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2010
Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
IEEE Commun. Lett., 2010

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2007
Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006

1993
The Christmas-Tree Switch: An Output Queuing Space-Division Fast Packet Switch Based on Inerleaving Distribution and Concentration Functions.
Comput. Networks ISDN Syst., 1993

1991
The Christmas-Tree Switch: An Output Queueing Space-Division Fast Packet Switch Based on Interleaving Distribution and Concentration Functions.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991


  Loading...