Wuqi Wang

According to our database1, Wuqi Wang authored at least 12 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anomaly diagnosis of connected autonomous vehicles: A survey.
Inf. Fusion, May, 2024

Potential sources of sensor data anomalies for autonomous vehicles: An overview from road vehicle safety perspective.
Expert Syst. Appl., February, 2024

2023
A Measurement Scheduling Method for Multi-vehicle Cooperative Localization Considering State Correlation.
Veh. Commun., December, 2023

2022
On-Ramp Merging Strategies of Connected and Automated Vehicles Considering Communication Delay.
IEEE Trans. Intell. Transp. Syst., 2022

WAFormer: Ship Detection in SAR Images Based on Window-Aware Swin-Transformer.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

2021
Residual Learning Attention CNN for Motion Intention Recognition Based on EEG Data.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, BioCAS 2021, 2021

An EMG-Based, Real-Time Personal Identification Method Using an Gesture-Detection 1D Convolutional Neural Networks.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, BioCAS 2021, 2021

2020
A Study of Personal Recognition Method Based on EMG Signal.
IEEE Trans. Biomed. Circuits Syst., 2020

2019
Live Demonstration: Wearable Body Area Network System Based on Low Power Body Channel Communication.
Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference, 2019

An EMG-Based Personal Identification Method Using Continuous Wavelet Transform and Convolutional Neural Networks.
Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference, 2019

2016
Intrusion Detection Technology Based on Rough Set Attribute Reduction Theory.
Proceedings of the Human Centered Computing - Second International Conference, 2016

2014
Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm.
Proceedings of the Human Centered Computing - First International Conference, 2014


  Loading...