Dejun Wang

Orcid: 0000-0002-8944-9482

According to our database1, Dejun Wang authored at least 60 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Language-independent Quantitative Analysis Method on Conformance between Legal Contract and Smart Contract.
Distributed Ledger Technol. Res. Pract., September, 2024

A Novel Point Cloud Adaptive Filtering Algorithm for LiDAR SLAM in Forest Environments Based on Guidance Information.
Remote. Sens., August, 2024

Fault Tolerant Control of 4-Wheel Independent Drive Vehicle Subject to Actuator Faults Based on Feasible Region.
IEEE Trans. Veh. Technol., 2024

A Multilevel Autoadaptive Denoising Algorithm Based on Forested Terrain Slope for ICESat-2 Photon-Counting Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator.
IET Blockchain, 2024

DDR-ECC: Dictionary-Driven Chinese ASR Entity Correction with Controllable Decoding.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

2023
Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data.
IET Cyper-Phys. Syst.: Theory & Appl., December, 2023

Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets.
Neural Networks, November, 2023

Precise and Efficient Pointing Control of a 2.5-m-Wide Field Survey Telescope Using ADRC and Nonlinear Disturbance Observer.
Sensors, July, 2023

K-Go: An executable formal semantics of Go language in K framework.
IET Blockchain, June, 2023

DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio.
Comput. Secur., June, 2023

Poison Dart Frog: A Clean-Label Attack with Low Poisoning Rate and High Attack Success Rate in the Absence of Training Data.
CoRR, 2023

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023

HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature.
Proceedings of the Advances in Information and Communication, 2023

2022
Improving the Sensing Properties of Graphene MEMS Pressure Sensor by Low-Temperature Annealing in Atmosphere.
Sensors, 2022

Infrared Small-Target Detection Based on Radiation Characteristics with a Multimodal Feature Fusion Network.
Remote. Sens., 2022

Research On Dialogue Management Model Based On A3C Algorithm.
Proceedings of the IEEE Smartworld, 2022

Policy2Graph: A Structure-aware Perspective on Constructing Policy Knowledge Graph for Smart Governance.
Proceedings of the IEEE Smartworld, 2022

Intelligent Vessel Scheduling System for the Controlled inland Waterway Based CPS<sup>*</sup>.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

Predicting Ship Speed in the Inland Waterways with LSTM Network.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022

A N-order Interpolated Variance Estimator Algorithm for Fusion of Inland Waterway Crowd-sourced Bathymetry Data.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022

Research on the quality of graduate students in provincial universities based on entropy weight TOPSIS and RSR - take changchun university as an example.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy.
IEEE Access, 2021

2020
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model.
Int. J. Netw. Secur., 2020

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.
IEEE Access, 2020

2019
Diffeomorphism Transformation Based Disturbance Rejection Control and Its Allocation of Vehicle Dynamic Stable Systems.
IEEE Access, 2019

A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
IEEE Access, 2019

2018
Tire Force Distribution Method With the Constraints of Executable Drive Space Consideration.
IEEE Trans. Veh. Technol., 2018

Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model.
Int. J. Netw. Secur., 2018

A Secure and Efficient Distributed Storage Scheme SAONT-RS Based on an Improved AONT and Erasure Coding.
IEEE Access, 2018

2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017

2016
A novel background-weighted histogram scheme based on foreground saliency for mean-shift tracking.
Multim. Tools Appl., 2016

2015
A Monolithic CMOS Magnetic Hall Sensor with High Sensitivity and Linearity Characteristics.
Sensors, 2015

2014
Robust Model-Based Sensor Fault Monitoring System for Nonlinear Systems in Sensor Networks.
Sensors, 2014

Efficient Mean-Shift Tracking Using an Improved Weighted Histogram Scheme.
KSII Trans. Internet Inf. Syst., 2014

Object Tracking with a Novel Method Based on FS-CBWH within Mean-Shift Framework.
Proceedings of the Advances in Neural Networks - ISNN 2014, 2014

Bayesian Covariance Tracking with Adaptive Feature Selection.
Proceedings of the Advances in Neural Networks - ISNN 2014, 2014

The lateral stability control of vehicles based on sliding mode method.
Proceedings of the IEEE International Conference on Information and Automation, 2014

2013
Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks.
J. Networks, 2013

Updating the Finite Element Model of Large-Scaled Structures using Component mode Synthesis Technique.
Intell. Autom. Soft Comput., 2013

2011
Vertical Gate RF SOI LIGBT for SPICs with Significantly Improved Latch-Up Immunity.
VLSI Design, 2011

Automatic Verification of Remote Internet Voting Protocol in Symbolic Model.
J. Networks, 2011

Research on Heterogeneous Resource Sharing and Dynamic Allocation Strategy in Campus Grid.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2010
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus.
J. Digit. Content Technol. its Appl., 2010

A Calculus of Consistent Component-based Software Updates
CoRR, 2010

Negative ESD robustness of a novel anti-ESD TGFPTD SOI LDMOS.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
R-OSGi-based architecture of distributed smart home system.
IEEE Trans. Consumer Electron., 2008

ASM-based model of dynamic service update in OSGi.
ACM SIGSOFT Softw. Eng. Notes, 2008

3-D Reconstruction of Shaded Objects from Multiple Images Under Unknown Illumination.
Int. J. Comput. Vis., 2008

Dynamic Software Upgrading for Distributed System Based on R-OSGI.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Research on Dynamic Updating of Grid Service.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Modeling of Complicate Traffic Simulation System.
Proceedings of the Digital Human Modeling, 2007

Supporting Dynamic Updates of Componentized Service.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Towards Robust and Physically Plausible Shaded Stereoscopic Segmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2006

A Workflow-Oriented Scripting Language Based on BPEL4WS.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2004
A novel heat kernel based Monte Carlo localization algorithm.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

Level Set Methods, Distance Function and Image Segmentation.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

2003
Illumination ratio image: synthesizing and recognition with varying illuminations.
Pattern Recognit. Lett., 2003

2001
Level Set Methods and Image Segmentation.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001


  Loading...