Chenyu Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
Bibliography
2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024
IEEE Internet Things J., May, 2024
Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain.
IEEE Trans. Veh. Technol., January, 2024
Merging planning in dense traffic scenarios using interactive safe reinforcement learning.
Knowl. Based Syst., 2024
CoRR, 2024
Denoising Reuse: Exploiting Inter-frame Motion Consistency for Efficient Video Latent Generation.
CoRR, 2024
CoRR, 2024
Derivative-Free Guidance in Continuous and Discrete Diffusion Models with Soft Value-Based Decoding.
CoRR, 2024
CoRR, 2024
Quality Assurance for Artificial Intelligence: A Study of Industrial Concerns, Challenges and Best Practices.
CoRR, 2024
Comput. Commun., 2024
Proceedings of the Medical Image Understanding and Analysis - 28th Annual Conference, 2024
Proceedings of the Intelligent Information Processing XII, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
When Green Learning Meets Federated Learning: Toward Distributed Learning with Low Complexity and Model Heterogeneity.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023
Edge Intelligence Empowered Vehicle Detection and Image Segmentation for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., November, 2023
Gibbon: An Efficient Co-Exploration Framework of NN Model and Processing-In-Memory Architecture.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023
Dual disentanglement of user-item interaction for recommendation with causal embedding.
Inf. Process. Manag., September, 2023
Remote closed-loop stabilization of robotic Euler-Bernoulli manipulator through predictor feedback.
Int. J. Intell. Robotics Appl., September, 2023
Microelectron. J., March, 2023
Convex and concave envelopes of artificial neural network activation functions for deterministic global optimization.
J. Glob. Optim., March, 2023
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023
Robust Dynamic State Estimation for DFIG via the Generalized Maximum Correntropy Criterion Ensemble Kalman Filter.
IEEE Trans. Instrum. Meas., 2023
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
Knowledge Graph Attention Network with Attribute Significance for Personalized Recommendation.
Neural Process. Lett., 2023
TMETA: Trust Management for the Cold Start of IoT Services With Digital-Twin-Aided Blockchain.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
CoRR, 2023
CoRR, 2023
A hybrid Decoder-DeepONet operator regression framework for unaligned observation data.
CoRR, 2023
Pyramid Swin Transformer: Different-Size Windows Swin Transformer for Image Classification and Object Detection.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023
What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub Issues.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Self-Supervised Spatial-Temporal Bottleneck Attentive Network for Efficient Long-term Traffic Forecasting.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Deep Learning-Based Joint Channel Coding and Frequency Modulation for Low Power Connectivity.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
MobileNet-DeepLabV3+ based Robot Passable Path Segmentation and Navigation Line Extraction.
Proceedings of the 7th International Conference on Computer Science and Application Engineering, 2023
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2023
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023
2022
Digit. Commun. Networks, December, 2022
ACM Trans. Softw. Eng. Methodol., 2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Syst. J., 2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022
IEEE Robotics Autom. Lett., 2022
A non-time division multiplexing single inductor solar and piezoelectric energy multi-input harvesting interface circuit.
Microelectron. J., 2022
Knowl. Based Syst., 2022
J. Inf. Secur. Appl., 2022
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022
IEEE Internet Things J., 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Proceedings of the 23rd ACIS International Summer Virtual Conference on Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022
Proceedings of the 14th International Conference on Education Technology and Computers, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
Medical Biol. Eng. Comput., 2021
Int. J. Wavelets Multiresolution Inf. Process., 2021
Periodic, Quasi-Periodic and Phase-Locked Oscillations and Stability in the Fiscal Dynamical Model with Tax Collection and Decision-Making Delays.
Int. J. Bifurc. Chaos, 2021
Practical Design Methodology of Mode-Conversion-Free Tightly Coupled Asymmetrically Tapered Bend for High-Density Differential Wiring.
IEICE Trans. Commun., 2021
Online bus-pooling service at the railway station for passengers and parcels sharing buses: A case in Dalian.
Expert Syst. Appl., 2021
Concurr. Comput. Pract. Exp., 2021
Distance dynamics based overlapping semantic community detection for node-attributed networks.
Comput. Intell., 2021
Comput. Biol. Medicine, 2021
Numerical Algorithm for Dynamic Impedance of Bridge Pile-Group Foundation and Its Validation.
Algorithms, 2021
Interpretable and visualized SHAP-based equalizer with feature selection in IMDD system.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2021
Development of Test Engine for Chinese Medicine Scale Provide Quantitative Tools for TCM Research.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021
Development of Scale Test Platform for Behavioral Medicine Using Artificial Intelligence Method to Accelerate the Computerization of Behavioral Medicine Scale.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021
Proceedings of the ICFET 2021: The 7th International Conference on Frontiers of Educational Technologies, Bangkok, Thailand, June 4, 2021
Research on the Application of Big Data in the Evaluation System of Music Teaching in Chinese Colleges and Universities.
Proceedings of the ICETC 2021: 13th International Conference on Education Technology and Computers, Wuhan, China, October 22, 2021
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
FutureText: A Blockchain-based Contract Signing Prototype with Security and Convenience.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021
2020
Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security".
Wirel. Commun. Mob. Comput., 2020
ACM Trans. Knowl. Discov. Data, 2020
Design of a New Vision-Based Method for the Bolts Looseness Detection in Flange Connections.
IEEE Trans. Ind. Electron., 2020
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020
Mitigating differential skew by rotating meshed ground for high-density layout in flexible printed circuits.
IEICE Electron. Express, 2020
Biomechanical comparison between metal block and cement-screw techniques for the treatment of tibial bone defects in total knee arthroplasty based on finite element analysis.
Comput. Biol. Medicine, 2020
Adv. Intell. Syst., 2020
Proceedings of the 1st Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 10th International Joint Conference on Natural Language Processing, 2020
Online Topic Detection and Tracking System and Its Application on Stock Market in China.
Proceedings of the Information Retrieval - 26th China Conference, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019
A Low Power Cardiovascular Healthcare System With Cross-Layer Optimization From Sensing Patch to Cloud Platform.
IEEE Trans. Biomed. Circuits Syst., 2019
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019
Chemical vapor deposition synthesis of two-dimensional freestanding transition metal oxychloride for electronic applications.
Sci. China Inf. Sci., 2019
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Application Research of Balanced Scorecard in Performance Assessment of Public Hospitals.
Proceedings of the 10th International Conference on E-business, Management and Economics, 2019
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018
Health Monitoring of Bolted Spherical Joint Connection Based on Active Sensing Technique Using Piezoceramic Transducers.
Sensors, 2018
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018
Design of a Novel Wearable Sensor Device for Real-Time Bolted Joints Health Monitoring.
IEEE Internet Things J., 2018
Modeling error PDF optimization based wavelet neural network modeling of dynamic system and its application in blast furnace ironmaking.
Neurocomputing, 2018
Fundam. Informaticae, 2018
Proceedings of the International Conference for High Performance Computing, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017
Quasi-V<sup>2</sup> hysteretic control boost DC-DC regulator with synthetic current ripple technique.
Int. J. Circuit Theory Appl., 2017
Int. J. Commun. Syst., 2017
CoRR, 2017
Dynamic Text Messaging in a Persuasive Gaming Environment to Promote Participation in Self-Tracking of Health Status.
Proceedings of the Fifth International Workshop on Behavior Change Support Systems co-located with the 12th International Conference on Persuasive Technology, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
Proceedings of the 12th IEEE International Conference on ASIC, 2017
2016
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016
Proceedings of the International Conference on Identification, 2016
Proceedings of the International Conference on Identification, 2016
Proceedings of the ESSCIRC Conference 2016: 42<sup>nd</sup> European Solid-State Circuits Conference, 2016
Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Proceedings of the RoboCup 2015: Robot World Cup XIX [papers from the 19th Annual RoboCup International Symposium, 2015
Proceedings of the 2015 International Conference on Digital Image Computing: Techniques and Applications, 2015
2014
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014
Proceedings of the 2014 International Conference on Digital Image Computing: Techniques and Applications, 2014
2013
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013
Proceedings of the 2013 International Symposium on VLSI Design, Automation, and Test, 2013
Proceedings of the RoboCup 2013: Robot World Cup XVII [papers from the 17th Annual RoboCup International Symposium, 2013
On the design of optimal active/sleep scheme for aggregator node in wireless sensor networks.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013
A Dynamic Dispatching Method of Resource Based on Particle Swarm Optimization for Cloud Computing Environment.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2011
2010
A new compact low-offset push-pull output buffer with current positive feedback for a 10-bit LCD source driver.
IET Circuits Devices Syst., 2010
2009
Area-efficient R-C DACs with Low-offset Push-pull Output Buffers for a 10-bit LCD Source Driver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology, 2009
2008
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence.
J. Manag. Inf. Syst., 2008
2007
The Deterrent Effect of Enforcement Against Computer Hackers: Cross-Country Evidence.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
2006
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006