Chenxu Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Multifrequency Wireless Channel Measurements and Characterization in Indoor Industrial Scenario.
IEEE Internet Things J., December, 2024

Imbalanced Domain Adaptation for Automatic Modulation Classification.
IEEE Wirel. Commun. Lett., November, 2024

SigDA: A Superimposed Domain Adaptation Framework for Automatic Modulation Classification.
IEEE Trans. Wirel. Commun., October, 2024

GTCAlign: Global Topology Consistency-Based Graph Alignment.
IEEE Trans. Knowl. Data Eng., May, 2024

A Geomagnetic/Odometry Integrated Localization Method for Differential Robot Using Real-Time Sequential Particle Filter.
Sensors, April, 2024

Meta Computing.
IEEE Netw., March, 2024

MS2OD: outlier detection using minimum spanning tree and medoid selection.
Mach. Learn. Sci. Technol., March, 2024

Optimal Passive Beamforming for Reconfigurable Intelligent Surface-Assisted Communications With Discrete Phase Shifts.
IEEE Wirel. Commun. Lett., February, 2024

Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree.
IEEE Trans. Netw. Sci. Eng., 2024

What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models.
IEEE Trans. Inf. Forensics Secur., 2024

Building a Lightweight Trusted Execution Environment for Arm GPUs.
IEEE Trans. Dependable Secur. Comput., 2024

SynSem-ASTE: An Enhanced Multi-Encoder Network for Aspect Sentiment Triplet Extraction With Syntax and Semantics.
IEEE Trans. Affect. Comput., 2024

An improved two-phase robust distributed Kalman filter.
Signal Process., 2024

Enhanced prediction model of short-term sea surface wind speed: A multiscale feature extraction and selection approach coupled with deep learning technique.
J. King Saud Univ. Comput. Inf. Sci., 2024

Learning-to-rank debias with popularity-weighted negative sampling and popularity regularization.
Neurocomputing, 2024

Sleepy Consensus in the Known Participation Model.
IACR Cryptol. ePrint Arch., 2024

Distribution-aware hybrid noise augmentation in graph contrastive learning for recommendation.
Expert Syst. Appl., 2024

Thought-Path Contrastive Learning via Premise-Oriented Data Augmentation for Logical Reading Comprehension.
CoRR, 2024

Multi-clue Consistency Learning to Bridge Gaps Between General and Oriented Object in Semi-supervised Detection.
CoRR, 2024

YZS-model: A Predictive Model for Organic Drug Solubility Based on Graph Convolutional Networks and Transformer-Attention.
CoRR, 2024

Demonstrating HumanTHOR: A Simulation Platform and Benchmark for Human-Robot Collaboration in a Shared Workspace.
CoRR, 2024

On the Utility of External Agent Intention Predictor for Human-AI Coordination.
CoRR, 2024

Identifying VPN Servers through Graph-Represented Behaviors.
Proceedings of the ACM on Web Conference 2024, 2024

SMUG: Sand Mixing for Unobserved Class Detection in Graph Few-Shot Learning.
Proceedings of the ACM on Web Conference 2024, 2024

Lower-Left Partial AUC: An Effective and Efficient Optimization Metric for Recommendation.
Proceedings of the ACM on Web Conference 2024, 2024

Millimeter Wave and Sub-THz Channel Measurements, Models and Comparisons in Indoor Industrial Environment.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

CAGE: Complementing Arm CCA with GPU Extensions.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

AFANS: Augmentation-Free Graph Contrastive Learning with Adversarial Negative Sampling.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

SWISP: Distributed Convoy Mining via Sliding Window-based Indexing and Sub-track Partitioning.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

Beyond Simple Text Style Transfer: Unveiling Compound Text Style Transfer with Prompt-Based Pre-Trained Language Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024

On the Utility of External Agent Intention Predictor for Human-AI Coordination.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

Towards Objectively Benchmarking Social Intelligence of Language Agents at the Action Level.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Rethinking Missing Data: Aleatoric Uncertainty-Aware Recommendation.
IEEE Trans. Big Data, December, 2023

Heterogeneous graph attention network with motif clique.
Neurocomputing, October, 2023

SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

An Improved S2A-Net Algorithm for Ship Object Detection in Optical Remote Sensing Images.
Remote. Sens., September, 2023

PosKHG: A Position-Aware Knowledge Hypergraph Model for Link Prediction.
Data Sci. Eng., June, 2023

Study of FIT Dedicated Computer with Dataflow Architecture for High Performance 2-D Magneto-Static Field Simulation.
IEICE Trans. Electron., April, 2023

A Hierarchical Decoder Architecture for Multilevel Fine-Grained Disaster Detection.
IEEE Trans. Geosci. Remote. Sens., 2023

Revisiting ARM Debugging Features: Nailgun and its Defense.
IEEE Trans. Dependable Secur. Comput., 2023

FuAlign: Cross-lingual entity alignment via multi-view representation learning of fused knowledge graphs.
Inf. Fusion, 2023

Time-aware Knowledge Hypergraph Link Prediction.
Int. J. Softw. Informatics, 2023

High-frequency plane piezoelectric transducer for high-sensitivity acoustics.
IEICE Electron. Express, 2023

Deep Reinforcement Learning with Multitask Episodic Memory Based on Task-Conditioned Hypernetwork.
CoRR, 2023

Fuzzy Frequency Droop Control of DFIG Wind Turbine Generators Adapted to Continuous Changes in Wind Speeds.
IEEE Access, 2023

HyConvE: A Novel Embedding Model for Knowledge Hypergraph Link Prediction with Convolutional Neural Networks.
Proceedings of the ACM Web Conference 2023, 2023

EnhancE: Enhanced Entity and Relation Embedding for Knowledge Hypergraph Link Prediction.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Prediction then Correction: An Abductive Prediction Correction Method for Sequential Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

A Novel Approach for Text Classification by Combining Pre-trained BERT Model with CNN Classifier.
Proceedings of the 6th IEEE International Conference on Information Systems and Computer Aided Educatio, 2023

Research and Development of Progressive Experimental System for Digital Electronic Technology with Fusion of Virtuality and Reality.
Proceedings of the 12th IEEE International Conference on Educational and Information Technology, 2023

Towards Understanding the Instability of Network Embedding (Extended Abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Numerical Semantic Modeling for Implicit Discourse Relation Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

Prompt-based Logical Semantics Enhancement for Implicit Discourse Relation Recognition.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

IDTracker: Discovering Illicit Website Communities via Third-party Service IDs.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Foreground Extraction in Histo-Pathological Image by Combining Mathematical Morphology Operations and U-Net.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
PushBox: Making Use of Every Bit of Time to Accelerate Completion of Data-Parallel Jobs.
IEEE Trans. Parallel Distributed Syst., 2022

Towards Understanding the Instability of Network Embedding.
IEEE Trans. Knowl. Data Eng., 2022

Extended Target Estimation and Recognition Based on Multimodel Approach and Waveform Diversity for Cognitive Radar.
IEEE Trans. Geosci. Remote. Sens., 2022

A Low-Cost Error-Tolerant Flip-Flop Against SET and SEU for Dependable Designs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Optimal Energy Scheduling and Sensitivity Analysis for Integrated Power-Water-Heat Systems.
IEEE Syst. J., 2022

Response Characteristics of Contactless Impedance Detection (CID) Sensor on Slug Flow in Small Channels: The Investigation on Slug Separation Distance.
Sensors, 2022

An Improved Trilateration Positioning Algorithm with Anchor Node Combination and K-Means Clustering.
Sensors, 2022

A Distributed Localization Method for Wireless Sensor Networks Based on Anchor Node Optimal Selection and Particle Filter.
Sensors, 2022

Semantic Segmentation of Remote Sensing Image Based on Regional Self-Attention Mechanism.
IEEE Geosci. Remote. Sens. Lett., 2022

MulSetRank: Multiple set ranking for personalized recommendation from implicit feedback.
Knowl. Based Syst., 2022

A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter.
J. Cloud Comput., 2022

Leveraging network structure for efficient dynamic negative sampling in network embedding.
Inf. Sci., 2022

AEP: Aligning knowledge graphs via embedding propagation.
Neurocomputing, 2022

One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks.
IACR Cryptol. ePrint Arch., 2022

Knowledge driven indoor object-goal navigation aid for visually impaired people.
Cogn. Comput. Syst., 2022

A Write-Buffer Scheme to Protect Cache Memories Against Multiple-Bit Errors.
IEEE Access, 2022

Design and implementation of vehicle oil online information monitoring system.
Proceedings of the 15th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2022

Black-Box Adversarial Attacks on Deep Neural Networks: A Survey.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

A Data-free Black-box Attack for Generating Transferable Adversarial Examples.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Explainable Link Prediction in Knowledge Hypergraphs.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

StrongBox: A GPU TEE on Arm Endpoints.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

POSE: A Positional Embedding Model for Knowledge Hypergraph Link Prediction.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Streaming Algorithms for Estimating High Set Similarities in LogLog Space.
IEEE Trans. Knowl. Data Eng., 2021

China in the eyes of news media: a case study under COVID-19 epidemic.
Frontiers Inf. Technol. Electron. Eng., 2021

Optimizing Power-Water-Heat Flows via Decomposed Iterative Convex Approximation.
CoRR, 2021

An Integrated Navigation and Localization System.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Detecting concurrency vulnerabilities based on partial orders of memory and thread events.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

CLUE: towards discovering locked cryptocurrencies in ethereum.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Advertisement Extraction from Content Marketing Articles via Segment-Aware Sentence Classification.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

An MTJ reading and writing control circuit applied in a 1-bit full adder.
Proceedings of the IECC 2021: 3rd International Electronics Communication Conference, Ho Chi Minh City, Vietnam, July 8, 2021

An MTJ Based 1-Bit Full Subtractor and Its Reading and Writing Circuit.
Proceedings of the 21st International Conference on Communication Technology, 2021

Video anomaly detection method based on future frame prediction and attention mechanism.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
DeepMMSE: A Deep Learning Approach to MMSE-Based Noise Power Spectral Density Estimation.
IEEE ACM Trans. Audio Speech Lang. Process., 2020

Range-Doppler Sidelobe Suppression for Pulsed Radar Based on Golay Complementary Codes.
IEEE Signal Process. Lett., 2020

Hierarchical and overlapping social circle identification in ego networks based on link clustering.
Neurocomputing, 2020

An Efficient Method for Training Deep Learning Networks Distributed.
IEICE Trans. Inf. Syst., 2020

Credible seed identification for large-scale structural network alignment.
Data Min. Knowl. Discov., 2020

Revisiting Factorizing Aggregated Posterior in Learning Disentangled Representations.
CoRR, 2020

A decision support system for automatic sleep staging from HRV using wavelet packet decomposition and energy features.
Biomed. Signal Process. Control., 2020

How to Retrain Recommender System?: A Sequential Meta-Learning Method.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Measuring the Semantic Stability of Word Embedding.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

M-Sosanet: An Efficient Convolution Network Backbone For Embedding Devices.
Proceedings of the IEEE International Conference on Image Processing, 2020

Extracting Advertisements from Content Marketing Articles based on TopicCNN.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management.
Sensors, 2019

Fast Algorithms for Designing Complementary Sets of Sequences Under Multiple Constraints.
IEEE Access, 2019

An Efficient Approximation of Betweenness Centrality for Uncertain Graphs.
IEEE Access, 2019

Enhancing Content Marketing Article Detection With Graph Analysis.
IEEE Access, 2019

A Novel ATPG Method to Increase Activation Probability of Hardware Trojan.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Identity-Based Multi-party Revocable Quantum-Resistant Signature with CSP.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

A Radiation Hardened Clock Inverter Cell with High Reliability for Mitigating SET in Clock Network.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Potential threats mining methods based on correlation analysis of multi-type logs.
IET Networks, 2018

Magnetic Properties and Microstructure of FeCoNi(CuAl)<sub>0.8</sub>Sn<sub><i>x</i></sub> (0 ≤ <i>x</i> ≤ 0.10) High-Entropy Alloys.
Entropy, 2018

Structure-Preserving-Based Model-Order Reduction of Parameterized Interconnect Systems.
Circuits Syst. Signal Process., 2018

SingleCaffe: An Efficient Framework for Deep Learning on a Single Node.
IEEE Access, 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Understanding the Behaviors of BGP-based DDoS Protection Services.
Proceedings of the Network and System Security - 12th International Conference, 2018

A Cross-Chain Solution to Integration of IoT Tangle for Data Access Management.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Slop: Towards an Efficient and Universal Streaming Log Parser.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

DeepMatching: A Structural Seed Identification Framework for Social Network Alignment.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

RPchain: A Blockchain-Based Academic Social Networking Service for Credible Reputation Building.
Proceedings of the Blockchain - ICBC 2018, 2018

DistForest: A Parallel Random Forest Training Framework Based on Supercomputer.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
The Minimum Norm Least-Squares Solution in Reduction by Krylov Subspace Methods.
J. Circuits Syst. Comput., 2017

Night Time Image Enhancement by Improved Nonlinear Model.
Proceedings of the Machine Learning and Intelligent Communications, 2017

From online to offline: Charactering user's online music listening behavior for efficacious offline radio program arrangement.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Characterizing the Impacts of Application Layer DDoS Attacks.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

GNMF Revisited: Joint Robust k-NN Graph and Reconstruction-Based Graph Regularization for Image Clustering.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

From micro to macro: Propagated constraints in social networks.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions.
Inf. Sci., 2016

Swarm intelligence algorithm for interconnect model order reduction with sub-block structure preserving.
Int. J. Syst. Sci., 2016

Modeling User Browsing Activity for Application Layer DDoS Attack Detection.
Proceedings of the Security and Privacy in Communication Networks, 2016

Asymmetric multiprocessing for motion control based on Zynq SoC.
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016

2015
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Syst. J., 2015

CoGA: Extension of GA on Heterogeneous System.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A DPA resistant dual rail Préchargé logic cell.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
A New Way for User's Web Communication Visualization and Measurement: Modeling, Experiment and Application.
IEICE Trans. Commun., 2014

Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

2013
A Low Power and variation-Insensitive Current-Mode Signaling Scheme.
J. Circuits Syst. Comput., 2013

An intelligent classification method for Trojan detection based on side-channel analysis.
IEICE Electron. Express, 2013

A Novel Image Registration Algorithm in Aerial Infrared Videos.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A Fast Alternative for Template Matching: An ObjectCode Method.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

2012
Who are active? An in-depth measurement on user activity characteristics in sina microblogging.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A more practical CPA attack against present hardware implementation.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2008
Based MATLAB on Advanced Encryption Standard (AES) IP Validation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...