Wujun Zhang

According to our database1, Wujun Zhang authored at least 23 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ultrahigh gain hot-electron tunneling transistor approaching the collection limit.
Sci. China Inf. Sci., June, 2023

2022
Blowup Rate Estimates of a Singular Potential and Its Gradient in the Landau-de Gennes Theory.
J. Nonlinear Sci., 2022

2019
Pointwise rates of convergence for the Oliker-Prussner method for the Monge-Ampère equation.
Numerische Mathematik, 2019

Two-scale method for the Monge-Ampère equation: Convergence to the viscosity solution.
Math. Comput., 2019

An Elementary Proof of Eigenvalue Preservation for the Co-rotational Beris-Edwards System.
J. Nonlinear Sci., 2019

2018
Rates of Convergence in W<sup>2<sub>p</sub></sup>-Norm for the Monge-Ampère Equation.
SIAM J. Numer. Anal., 2018

The Ericksen model of liquid crystals with colloidal and electric effects.
J. Comput. Phys., 2018

Discrete ABP Estimate and Convergence Rates for Linear Elliptic Equations in Non-divergence Form.
Found. Comput. Math., 2018

2017
A Finite Element Method for Nematic Liquid Crystals with Variable Degree of Orientation.
SIAM J. Numer. Anal., 2017

Numerical analysis of strongly nonlinear PDEs.
Acta Numer., 2017

2016
Contraction property of adaptive hybridizable discontinuous Galerkin methods.
Math. Comput., 2016

Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
Int. J. Grid Util. Comput., 2016

2015
A GAA-based batch authentication and key agreement for LTE networks.
Int. J. Embed. Syst., 2015

2014
An a posteriori error estimate for the variable-degree Raviart-Thomas method.
Math. Comput., 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

Attribute-Based Fine-Grained Access Control with User Revocation.
Proceedings of the Information and Communication Technology, 2014

Group Key Agreement in Multimedia Service for Machine Type Communication.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
A Posteriori Error Analysis for Hybridizable Discontinuous Galerkin Methods for Second Order Elliptic Problems.
SIAM J. Numer. Anal., 2013

End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Clust. Comput., 2013

Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A Posteriori Error Estimates for HDG Methods.
J. Sci. Comput., 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
Research of Action Description of Virtual Vehicle in Transportation Virtual Scene Based on VRML.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010


  Loading...