Dejun Wang
Orcid: 0000-0002-8944-9482
According to our database1,
Dejun Wang
authored at least 60 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Language-independent Quantitative Analysis Method on Conformance between Legal Contract and Smart Contract.
Distributed Ledger Technol. Res. Pract., September, 2024
A Novel Point Cloud Adaptive Filtering Algorithm for LiDAR SLAM in Forest Environments Based on Guidance Information.
Remote. Sens., August, 2024
Fault Tolerant Control of 4-Wheel Independent Drive Vehicle Subject to Actuator Faults Based on Feasible Region.
IEEE Trans. Veh. Technol., 2024
A Multilevel Autoadaptive Denoising Algorithm Based on Forested Terrain Slope for ICESat-2 Photon-Counting Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator.
IET Blockchain, 2024
Proceedings of the Natural Language Processing and Chinese Computing, 2024
2023
Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data.
IET Cyper-Phys. Syst.: Theory & Appl., December, 2023
Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets.
Neural Networks, November, 2023
Precise and Efficient Pointing Control of a 2.5-m-Wide Field Survey Telescope Using ADRC and Nonlinear Disturbance Observer.
Sensors, July, 2023
IET Blockchain, June, 2023
DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio.
Comput. Secur., June, 2023
Poison Dart Frog: A Clean-Label Attack with Low Poisoning Rate and High Attack Success Rate in the Absence of Training Data.
CoRR, 2023
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023
HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature.
Proceedings of the Advances in Information and Communication, 2023
2022
Improving the Sensing Properties of Graphene MEMS Pressure Sensor by Low-Temperature Annealing in Atmosphere.
Sensors, 2022
Infrared Small-Target Detection Based on Radiation Characteristics with a Multimodal Feature Fusion Network.
Remote. Sens., 2022
Proceedings of the IEEE Smartworld, 2022
Policy2Graph: A Structure-aware Perspective on Constructing Policy Knowledge Graph for Smart Governance.
Proceedings of the IEEE Smartworld, 2022
Intelligent Vessel Scheduling System for the Controlled inland Waterway Based CPS<sup>*</sup>.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022
A N-order Interpolated Variance Estimator Algorithm for Fusion of Inland Waterway Crowd-sourced Bathymetry Data.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022
Research on the quality of graduate students in provincial universities based on entropy weight TOPSIS and RSR - take changchun university as an example.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022
2021
A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy.
IEEE Access, 2021
2020
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model.
Int. J. Netw. Secur., 2020
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.
IEEE Access, 2020
2019
Diffeomorphism Transformation Based Disturbance Rejection Control and Its Allocation of Vehicle Dynamic Stable Systems.
IEEE Access, 2019
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
IEEE Access, 2019
2018
Tire Force Distribution Method With the Constraints of Executable Drive Space Consideration.
IEEE Trans. Veh. Technol., 2018
Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model.
Int. J. Netw. Secur., 2018
A Secure and Efficient Distributed Storage Scheme SAONT-RS Based on an Improved AONT and Erasure Coding.
IEEE Access, 2018
2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017
2016
A novel background-weighted histogram scheme based on foreground saliency for mean-shift tracking.
Multim. Tools Appl., 2016
2015
A Monolithic CMOS Magnetic Hall Sensor with High Sensitivity and Linearity Characteristics.
Sensors, 2015
2014
Robust Model-Based Sensor Fault Monitoring System for Nonlinear Systems in Sensor Networks.
Sensors, 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the Advances in Neural Networks - ISNN 2014, 2014
Proceedings of the Advances in Neural Networks - ISNN 2014, 2014
Proceedings of the IEEE International Conference on Information and Automation, 2014
2013
Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks.
J. Networks, 2013
Updating the Finite Element Model of Large-Scaled Structures using Component mode Synthesis Technique.
Intell. Autom. Soft Comput., 2013
2011
VLSI Design, 2011
J. Networks, 2011
Research on Heterogeneous Resource Sharing and Dynamic Allocation Strategy in Campus Grid.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011
2010
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus.
J. Digit. Content Technol. its Appl., 2010
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010
2009
Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
IEEE Trans. Consumer Electron., 2008
ACM SIGSOFT Softw. Eng. Notes, 2008
3-D Reconstruction of Shaded Objects from Multiple Images Under Unknown Illumination.
Int. J. Comput. Vis., 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Digital Human Modeling, 2007
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007
2006
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2004
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004
2003
Pattern Recognit. Lett., 2003
2001
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001