Wenyong Wang

Orcid: 0000-0003-4095-547X

According to our database1, Wenyong Wang authored at least 73 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Incorporating Riemannian Geometric Features for Learning Coefficient of Pressure Distributions on Airplane Wings.
CoRR, 2024

2023
Can Video as a Service Paradigm Lead to the Future Internet of Video Things?
Computer, November, 2023

A Manifold-Based Airfoil Geometric-Feature Extraction and Discrepant Data Fusion Learning Method.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

Multi-MEC collaboration for VR video transmission: Architecture and cache algorithm design.
Comput. Networks, October, 2023

Dual semantic-aligned clustering for cross-domain person re-identification.
Multim. Syst., August, 2023

GradingShard: A new sharding protocol to improve blockchain throughput.
Peer Peer Netw. Appl., May, 2023

Novel deep learning methods for 3D flow field segmentation and classification.
CoRR, 2023

Qmix-Based Cross-Domain Transmission Routing for Time-Sensitive and Deterministic Networks.
Proceedings of the 24th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2023

Beyond the Field of View: Neglected Audio Part in VR Video Transmission Frameworks.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Pedestrian Recognition with Radar Data-Enhanced Deep Learning Approach Based on Micro-Doppler Signatures.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Intelligent Collaborative Control of Multi-source Heterogeneous Data Streams for Low-Power IoT: A Flow Machine Learning Approach.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Flow Field Reconstructions With GANs Based on Radial Basis Functions.
IEEE Trans. Aerosp. Electron. Syst., 2022

CPACK: An Intelligent Cyber-Physical Access Control Kit for Protecting Network.
Sensors, 2022

An Energy-Efficient Framework in Radio Multi-Access Edge Cloud by Automatically Generating Network Slice.
IEEE Internet Things Mag., 2022

Efficient Orchestration of Virtualization Resource in RAN Based on Chemical Reaction Optimization and Q-Learning.
IEEE Internet Things J., 2022

A state sharding model on the blockchain.
Clust. Comput., 2022

A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS.
Comput. J., 2022

Intrusion detection technique based on flow aggregation and latent semantic analysis.
Appl. Soft Comput., 2022

Cache Top-level domain locally: make DNS respond quickly in mobile network.
Proceedings of the IEEE International Conference on Trust, 2022

Multi-MEC Cooperation Based VR Video Transmission and Cache Using K-Shortest Paths Optimization.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

A Multi-Characteristic Learning Method with Micro-Doppler Signatures for Pedestrian Identification.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

2021
A Vehicle Control Model to Alleviate Traffic Instability.
IEEE Trans. Veh. Technol., 2021

Joint resource allocation for emotional 5G IoT systems using deep reinforcement learning.
Int. J. Mach. Learn. Cybern., 2021

Comparative study on the time series forecasting of web traffic based on statistical model and Generative Adversarial model.
Knowl. Based Syst., 2021

Application of Improved Asynchronous Advantage Actor Critic Reinforcement Learning Model on Anomaly Detection.
Entropy, 2021

Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties.
CoRR, 2021

IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology.
CoRR, 2021

A Vehicles Control Model to Alleviate Traffic Instability.
CoRR, 2021

A multi-channel anomaly detection method with feature selection and multi-scale analysis.
Comput. Networks, 2021

An Integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals.
Comput. Medical Imaging Graph., 2021

Transformer with Syntactic Position Encoding for Machine Translation.
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), 2021

An User-Driven Active Way to Push ACL in Software-Defined Networking.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

A Simplified and Effective Solution for Hybrid SDN Network Deployment.
Proceedings of the Network and System Security - 15th International Conference, 2021

Service Deployment and Service Request Optimization Scheduling in MEC enabled LEO Networks.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Rear-End Collision Avoidance-Based on Multi-Channel Detection.
IEEE Trans. Intell. Transp. Syst., 2020

Time Series Forecasting and Classification Models Based on Recurrent with Attention Mechanism and Generative Adversarial Networks.
Sensors, 2020

WatchPose: A View-Aware Approach for Camera Pose Data Collection in Industrial Environments.
Sensors, 2020

A self-attention-based destruction and construction learning fine-grained image classification method for retail product recognition.
Neural Comput. Appl., 2020

Blockchain-Federated-Learning and Deep Learning Models for COVID-19 detection using CT Imaging.
CoRR, 2020

Neural Networks-Based Aerodynamic Data Modeling: A Comprehensive Review.
IEEE Access, 2020

2019
A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN.
Sensors, 2019

Wavelet integrated residual dictionary training for single image super-resolution.
Multim. Tools Appl., 2019

Event-triggered passive control for Markovian jump discrete-time systems with incomplete transition probability and unreliable channels.
J. Frankl. Inst., 2019

Research on Multiple Sensors Vehicle Detection With EMD-Based Denoising.
IEEE Internet Things J., 2019

Energy-Efficient Joint Resource Allocation Algorithms for MEC-Enabled Emotional Computing in Urban Communities.
IEEE Access, 2019

A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features.
IEEE Access, 2019

A Traffic Anomaly Detection Method based on Multi-scale Decomposition and Multi-Channel Detector.
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019

2018
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω).
Int. J. Inf. Secur. Priv., 2018

A SVR-ANN combined model based on ensemble EMD for rainfall prediction.
Appl. Soft Comput., 2018

2017
A new feature selection method based on a validity index of feature subset.
Pattern Recognit. Lett., 2017

An efficient instance selection algorithm to reconstruct training set for support vector machine.
Knowl. Based Syst., 2017

A new Centroid-Based Classification model for text categorization.
Knowl. Based Syst., 2017

A new validity index of feature subset for evaluating the dimensionality reduction algorithms.
Knowl. Based Syst., 2017

2016
Efran (O): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving".
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
A layer-based algorithm for the construction of connected dominating set in WSNs.
Int. J. Auton. Adapt. Commun. Syst., 2015

2013
A routing algorithm on delay-tolerant of wireless sensor network based on the node selfishness.
EURASIP J. Wirel. Commun. Netw., 2013

2012
Optical Waveguide Lightmode Spectroscopy (OWLS) as a Sensor for Thin Film and Quantum Dot Corrosion.
Sensors, 2012

Leveraging 1-hop Neighborhood Knowledge for Connected Dominating Set in Wireless Sensor Networks.
J. Comput., 2012

An Energy-Efficient Distributed Algorithm for Virtual Backbone Construction with Cellular Structure in WSN.
Int. J. Distributed Sens. Networks, 2012

2010
Construction and Visualization of Wheat Roots Model Based on Artificial Life.
J. Softw., 2010

One-Hop Neighbor Transmission Coverage Information Based Distributed Algorithm for Connected Dominating Set.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

2009
Priority-based low-power task scheduling for wireless sensor network.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

2008
Phase Detection Based on the Lock-in Amplifier SR844 and Experiments of Brain Neuron Cells in MIT System.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

Estimating Half-Path RTT in Backbone Network.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2006
A Software Architecture Based on Multi-Agent and Grid Computing for Electric Power System Applications.
Proceedings of the Fifth International Conference on Parallel Computing in Electrical Engineering (PARELEC 2006), 2006

Routing Protocols for an Integrated Cellular and Ad-hoc Network with Flexible Access and Their Overhead Analysis.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Visualization Model of Virtual Plant Growth and its Application.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

Virtual Clone Fish Experiment.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

Modeling of Artificial Life Based Virtual Fish Behavior.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

Virtual Biology Modeling Method Based on Validity Confirmation Mechanism.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

2005
Electronic Transport in Molecular Self-Assembled Monolayer Devices.
Proc. IEEE, 2005

2003
Data Securing through Rule-Driven Mobile Agents and IPsec.
Proceedings of the Advances in Web-Age Information Management, 2003


  Loading...