Xinyuan Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Xinyuan Wang 001 (Aerospace Information Research Institute, Chinese Academy of Sciences, Beijing, China)
- Xinyuan Wang 002 (Hohai University, Nanjing, China)
- Xinyuan Wang 003 (University of Toronto, ON, Canada)
- Xinyuan Wang 004 (Beijing University of Posts and Telecommunications, Beijing, China)
- Xinyuan Wang 005 (George Mason University, Fairfax VA, USA)
- Xinyuan Wang 006 (Huawei Technologies Co. Ltd., Beijing, China)
- Xinyuan Wang 007 (Nanjing University, Nanjing, China)
- Xinyuan Wang 008 (University of California at San Diego, La Jolla, CA, USA)
- Xinyuan Wang 009 (Beihang University, Beijing, China)
Bibliography
2024
Frontiers Comput. Sci., August, 2024
Ecological Efficiency Measurement and Technical Heterogeneity Analysis in China: A Two-Stage Three-Level Meta-Frontier Network Model Based on Segmented Projection.
Syst., 2024
CoRR, 2024
LLM-Enhanced User-Item Interactions: Leveraging Edge Information for Optimized Recommendations.
CoRR, 2024
BiPFT: Binary Pre-trained Foundation Transformer with Low-Rank Estimation of Binarization Residual Polynomials.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
An Overview of GIS-RS Applications for Archaeological and Cultural Heritage under the DBAR-Heritage Mission.
Remote. Sens., December, 2023
IEEE Commun. Stand. Mag., September, 2023
PromptAgent: Strategic Planning with Language Models Enables Expert-level Prompt Optimization.
CoRR, 2023
Detecting Stealthy Cobalt Strike C&C Activities via Multi-Flow based Machine Learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
2022
IEEE Trans. Mob. Comput., 2022
Signal Image Video Process., 2022
Mapping of Soil Organic Carbon Stocks Based on Aerial Photography in a Fragmented Desertification Landscape.
Remote. Sens., 2022
Spatial-Temporal Relationship Analysis of Vegetation Phenology and Meteorological Parameters in an Agro-Pasture Ecotone in China.
Remote. Sens., 2022
JOCN, 2022
High-performance dual-band radio-over-fiber link for future 5G radio access applications.
JOCN, 2022
Frontiers Neuroinformatics, 2022
BMC Bioinform., 2022
Compatibility Simulation Research of Variable Frequency AC Power System for More Electric Aircraft.
Proceedings of the IEEE International Conference on Industrial Technology, 2022
2021
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
Design and Real-Time Implementation of Takagi-Sugeno Fuzzy Controller for Magnetic Levitation Ball System.
IEEE Access, 2020
Proceedings of the VINCI 2020: The 13th International Symposium on Visual Information Communication and Interaction, 2020
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020
2019
Remote. Sens., 2019
Application of discrete-time Bayesian network on reliability analysis of uncertain system with common cause failure.
Qual. Reliab. Eng. Int., 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2014
Application of Hough Forests for the detection of grave mounds in high-resolution satellite imagery.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014
2013
Determining oil slick thickness using hyperspectral remote sensing in the Bohai Sea of China.
Int. J. Digit. Earth, 2013
2011
Power scheduling between channel and parameter estimation for homogeneous sensor networks.
Proceedings of the 2011 IEEE International Symposium on Robotic and Sensors Environments, 2011
2009
On the effectiveness of low latency anonymous network in the presence of timing attack.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2006
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones.
Int. J. Secur. Networks, 2006
2004
The loop fallacy and serialization in tracing intrusion connections through stepping stones.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
1999
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999