Chenyu Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024

Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices.
IEEE Internet Things J., May, 2024

Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain.
IEEE Trans. Veh. Technol., January, 2024

A new CMOS-memristor based D-latch with fewer components.
Microelectron. J., 2024

Merging planning in dense traffic scenarios using interactive safe reinforcement learning.
Knowl. Based Syst., 2024

A fully floating memristor emulator with long-term memory.
Integr., 2024

An Information Criterion for Controlled Disentanglement of Multimodal Data.
CoRR, 2024

Fine-Tuning Discrete Diffusion Models via Reward Optimization with Applications to DNA and Protein Design.
CoRR, 2024

"What" x "When" working memory representations using Laplace Neural Manifolds.
CoRR, 2024

Denoising Reuse: Exploiting Inter-frame Motion Consistency for Efficient Video Latent Generation.
CoRR, 2024

Priority based inter-twin communication in vehicular digital twin networks.
CoRR, 2024

Derivative-Free Guidance in Continuous and Discrete Diffusion Models with Soft Value-Based Decoding.
CoRR, 2024

LADDER: Language Driven Slice Discovery and Error Rectification.
CoRR, 2024

Evaluating Zero-Shot Long-Context LLM Compression.
CoRR, 2024

In-Context Symmetries: Self-Supervised Learning through Contextual World Models.
CoRR, 2024

Quality Assurance for Artificial Intelligence: A Study of Industrial Concerns, Challenges and Best Practices.
CoRR, 2024

MLLM-Tool: A Multimodal Large Language Model For Tool Agent Learning.
CoRR, 2024

A robust and effective 3-factor authentication protocol for smart factory in IIoT.
Comput. Commun., 2024

A Privacy Leakage Detection Method for Personalized Course Recommendation Based on Pi-Calculus.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

Generating Chest Radiology Report Findings Using a Multimodal Method.
Proceedings of the Medical Image Understanding and Analysis - 28th Annual Conference, 2024

Efficient and Secure Authentication Scheme for Internet of Vehicles.
Proceedings of the Intelligent Information Processing XII, 2024

Unveiling Memorization in Code Models.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Dirichlet Flow Matching with Applications to DNA Sequence Design.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Hierarchical State Space Models for Continuous Sequence-to-Sequence Modeling.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Removing Biases from Molecular Representations via Information Maximization.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Bridging the Data Gap in Federated Preference Learning with AIGC.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

When Green Learning Meets Federated Learning: Toward Distributed Learning with Low Complexity and Model Heterogeneity.
Proceedings of the IEEE International Conference on Acoustics, 2024

SynthSL: Expressive Humans for Sign Language Image Synthesis.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

EPIM: Efficient Processing-In-Memory Accelerators based on Epitome.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023

Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023

Edge Intelligence Empowered Vehicle Detection and Image Segmentation for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., November, 2023

Gibbon: An Efficient Co-Exploration Framework of NN Model and Processing-In-Memory Architecture.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023

A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023

Dual disentanglement of user-item interaction for recommendation with causal embedding.
Inf. Process. Manag., September, 2023

Remote closed-loop stabilization of robotic Euler-Bernoulli manipulator through predictor feedback.
Int. J. Intell. Robotics Appl., September, 2023

Research progress and applications of memristor emulator circuits.
Microelectron. J., March, 2023

Convex and concave envelopes of artificial neural network activation functions for deterministic global optimization.
J. Glob. Optim., March, 2023

Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023

Robust Dynamic State Estimation for DFIG via the Generalized Maximum Correntropy Criterion Ensemble Kalman Filter.
IEEE Trans. Instrum. Meas., 2023

Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

Knowledge Graph Attention Network with Attribute Significance for Personalized Recommendation.
Neural Process. Lett., 2023

TMETA: Trust Management for the Cold Start of IoT Services With Digital-Twin-Aided Blockchain.
IEEE Internet Things J., 2023

Sustainable Blockchain-Based Digital Twin Management Architecture for IoT Devices.
IEEE Internet Things J., 2023

Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models.
CoRR, 2023

What Do Code Models Memorize? An Empirical Study on Large Language Models of Code.
CoRR, 2023

A hybrid Decoder-DeepONet operator regression framework for unaligned observation data.
CoRR, 2023

Pyramid Swin Transformer: Different-Size Windows Swin Transformer for Image Classification and Object Detection.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub Issues.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Are We Ready to Embrace Generative AI for Software Q&A?
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Confidence-Aware Clustered Landmark Filtering For Hybrid 3D Face Tracking.
Proceedings of the IEEE International Conference on Image Processing, 2023

Self-Supervised Spatial-Temporal Bottleneck Attentive Network for Efficient Long-term Traffic Forecasting.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Deep Learning-Based Joint Channel Coding and Frequency Modulation for Low Power Connectivity.
Proceedings of the IEEE International Conference on Communications, 2023

An Adaptive Learning Feature Model Validation Methodology Based on Formal Methods.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

MobileNet-DeepLabV3+ based Robot Passable Path Segmentation and Navigation Line Extraction.
Proceedings of the 7th International Conference on Computer Science and Application Engineering, 2023

Pyramid Swin Transformer for Multi-task: Expanding to More Computer Vision Tasks.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2023

Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Enhancing the robustness of object detection via 6G vehicular edge computing.
Digit. Commun. Networks, December, 2022

SPI: Automated Identification of Security Patches via Commits.
ACM Trans. Softw. Eng. Methodol., 2022

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT.
IEEE Syst. J., 2022

Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022

VECtor: A Versatile Event-Centric Benchmark for Multi-Sensor SLAM.
IEEE Robotics Autom. Lett., 2022

A non-time division multiplexing single inductor solar and piezoelectric energy multi-input harvesting interface circuit.
Microelectron. J., 2022

Quaternion-based knowledge graph neural network for social recommendation.
Knowl. Based Syst., 2022

A novel model for voice command fingerprinting using deep learning.
J. Inf. Secur. Appl., 2022

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022

Digital-Twin-Aided Product Design Framework For IoT Platforms.
IEEE Internet Things J., 2022

DELTA: Dynamically Optimizing GPU Memory beyond Tensor Recomputation.
CoRR, 2022

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022

Speed-up Single Shot Detector on GPU with CUDA.
Proceedings of the 23rd ACIS International Summer Virtual Conference on Software Engineering, 2022

Demystifying the underground ecosystem of account registration bots.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Accurate Instance-Level CAD Model Retrieval in a Large-Scale Database.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

Application of OMO Teaching Mode in Music Education in Colleges.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022

Gibbon: Efficient Co-Exploration of NN Model and Processing-In-Memory Architecture.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Neural Bandits for Protein Sequence Optimization.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

HAGEN: Homophily-Aware Graph Convolutional Recurrent Network for Crime Forecasting.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Suburban Demand Responsive Transit Service With Rental Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

The advances of topology optimization techniques in orthopedic implants: A review.
Medical Biol. Eng. Comput., 2021

Continuous-domain ant colony optimization algorithm based on reinforcement learning.
Int. J. Wavelets Multiresolution Inf. Process., 2021

Periodic, Quasi-Periodic and Phase-Locked Oscillations and Stability in the Fiscal Dynamical Model with Tax Collection and Decision-Making Delays.
Int. J. Bifurc. Chaos, 2021

Practical Design Methodology of Mode-Conversion-Free Tightly Coupled Asymmetrically Tapered Bend for High-Density Differential Wiring.
IEICE Trans. Commun., 2021

Online bus-pooling service at the railway station for passengers and parcels sharing buses: A case in Dalian.
Expert Syst. Appl., 2021

Research on partitioning algorithm based on RDF graph.
Concurr. Comput. Pract. Exp., 2021

Distance dynamics based overlapping semantic community detection for node-attributed networks.
Comput. Intell., 2021

Design and properties of biomimetic irregular scaffolds for bone tissue engineering.
Comput. Biol. Medicine, 2021

Numerical Algorithm for Dynamic Impedance of Bridge Pile-Group Foundation and Its Validation.
Algorithms, 2021

Interpretable and visualized SHAP-based equalizer with feature selection in IMDD system.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2021

Development of Test Engine for Chinese Medicine Scale Provide Quantitative Tools for TCM Research.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021

Development of Scale Test Platform for Behavioral Medicine Using Artificial Intelligence Method to Accelerate the Computerization of Behavioral Medicine Scale.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021

Design and Implementation of Music Distance Education Learning System.
Proceedings of the ICFET 2021: The 7th International Conference on Frontiers of Educational Technologies, Bangkok, Thailand, June 4, 2021

Research on the Application of Big Data in the Evaluation System of Music Teaching in Chinese Colleges and Universities.
Proceedings of the ICETC 2021: 13th International Conference on Education Technology and Computers, Wuhan, China, October 22, 2021

Cloud task scheduling based on improved grey wolf optimization algorithm.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Open Domain Generalization with Domain-Augmented Meta-Learning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

FutureText: A Blockchain-based Contract Signing Prototype with Security and Convenience.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

2020
Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security".
Wirel. Commun. Mob. Comput., 2020

Network Embedding for Community Detection in Attributed Networks.
ACM Trans. Knowl. Discov. Data, 2020

Design of a New Vision-Based Method for the Bolts Looseness Detection in Flange Connections.
IEEE Trans. Ind. Electron., 2020

Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020

Mitigating differential skew by rotating meshed ground for high-density layout in flexible printed circuits.
IEICE Electron. Express, 2020

Biomechanical comparison between metal block and cement-screw techniques for the treatment of tibial bone defects in total knee arthroplasty based on finite element analysis.
Comput. Biol. Medicine, 2020

A Braitenberg Vehicle Based on Memristive Neuromorphic Circuits.
Adv. Intell. Syst., 2020

ExpanRL: Hierarchical Reinforcement Learning for Course Concept Expansion in MOOCs.
Proceedings of the 1st Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 10th International Joint Conference on Natural Language Processing, 2020

Online Topic Detection and Tracking System and Its Application on Stock Market in China.
Proceedings of the Information Retrieval - 26th China Conference, 2020

MOOCCube: A Large-scale Data Repository for NLP Applications in MOOCs.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019

A Low Power Cardiovascular Healthcare System With Cross-Layer Optimization From Sensing Patch to Cloud Platform.
IEEE Trans. Biomed. Circuits Syst., 2019

A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019

Chemical vapor deposition synthesis of two-dimensional freestanding transition metal oxychloride for electronic applications.
Sci. China Inf. Sci., 2019

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Corking by Forking: Vulnerability Analysis of Blockchain.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Application Research of Balanced Scorecard in Performance Assessment of Public Hospitals.
Proceedings of the 10th International Conference on E-business, Management and Economics, 2019

User and Topic Hybrid Context Embedding for Finance-Related Text Data Mining.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

Course Concept Expansion in MOOCs with External Knowledge and Interactive Game.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018

Health Monitoring of Bolted Spherical Joint Connection Based on Active Sensing Technique Using Piezoceramic Transducers.
Sensors, 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018

Design of a Novel Wearable Sensor Device for Real-Time Bolted Joints Health Monitoring.
IEEE Internet Things J., 2018

Modeling error PDF optimization based wavelet neural network modeling of dynamic system and its application in blast furnace ironmaking.
Neurocomputing, 2018

A New Approach to Security Analysis of Smart Home Authentication Systems.
Fundam. Informaticae, 2018

Big data analysis for evaluating bioinvasion risk.
BMC Bioinform., 2018

Large-scale hierarchical <i>k-means</i> for heterogeneous many-core supercomputers.
Proceedings of the International Conference for High Performance Computing, 2018

On the Weakness of Constant Blinding PRNG in Flash Player.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017

Quasi-V<sup>2</sup> hysteretic control boost DC-DC regulator with synthetic current ripple technique.
Int. J. Circuit Theory Appl., 2017

A lightweight password-based authentication protocol using smart card.
Int. J. Commun. Syst., 2017

Nonparametric Variational Auto-encoders for Hierarchical Representation Learning.
CoRR, 2017

Dynamic Text Messaging in a Persuasive Gaming Environment to Promote Participation in Self-Tracking of Health Status.
Proceedings of the Fifth International Workshop on Behavior Change Support Systems co-located with the 12th International Conference on Persuasive Technology, 2017

Nonparametric Variational Auto-Encoders for Hierarchical Representation Learning.
Proceedings of the IEEE International Conference on Computer Vision, 2017

An area efficient low power ECoG front-end chip for digitalized subdural grid.
Proceedings of the 12th IEEE International Conference on ASIC, 2017

2016
RunPlay: Action Recognition Using Wearable Device Apply on Parkour Game.
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016

Circle-Covering Algorithm for Multiple-POI Searching.
Proceedings of the International Conference on Identification, 2016

Stackelberg Game Based Tasks Assignment Mechanism Using Reputation in Crowdsourcing.
Proceedings of the International Conference on Identification, 2016

A wearable ECG monitoring device with flexible embedded denoising and compression.
Proceedings of the ESSCIRC Conference 2016: 42<sup>nd</sup> European Solid-State Circuits Conference, 2016

Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
The Goalkeeper Strategy of RoboCup MSL Based on Dual Image Source.
Proceedings of the RoboCup 2015: Robot World Cup XIX [papers from the 19th Annual RoboCup International Symposium, 2015

Face Recognition Despite Wearing Glasses.
Proceedings of the 2015 International Conference on Digital Image Computing: Techniques and Applications, 2015

2014
Energy efficient distributed kalman filter for wireless sensor networks.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

A Novel Landmark Detector System for Multi Resolution Frontal Faces.
Proceedings of the 2014 International Conference on Digital Image Computing: Techniques and Applications, 2014

2013
Aggregator Modeling with Multiple Active/Sleep Modes for Wireless Sensor Networks.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

A high effieciency DC/DC boost regulator with adaptive off/on-time control.
Proceedings of the 2013 International Symposium on VLSI Design, Automation, and Test, 2013

Team Water: The Champion of the RoboCup Middle Size League Competition 2013.
Proceedings of the RoboCup 2013: Robot World Cup XVII [papers from the 17th Annual RoboCup International Symposium, 2013

On the design of optimal active/sleep scheme for aggregator node in wireless sensor networks.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

Cross-Phase Optimization in MapReduce.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

A Dynamic Dispatching Method of Resource Based on Particle Swarm Optimization for Cloud Computing Environment.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Sharing-Aware Cloud-Based Mobile Outsourcing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
A fast-transient quasi-V<sup>2</sup> switching buck regulator using AOT control.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2011

2010
A new compact low-offset push-pull output buffer with current positive feedback for a 10-bit LCD source driver.
IET Circuits Devices Syst., 2010

2009
Area-efficient R-C DACs with Low-offset Push-pull Output Buffers for a 10-bit LCD Source Driver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Robust Optimization of Supply Chain in the Economic Crisis.
Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology, 2009

2008
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence.
J. Manag. Inf. Syst., 2008

2007
The Deterrent Effect of Enforcement Against Computer Hackers: Cross-Country Evidence.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

2006
Current-Mode Converters with Adjustable-Slope Compensating Ramp.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006


  Loading...