Junhua Wu

Orcid: 0000-0001-8723-2389

According to our database1, Junhua Wu authored at least 62 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain.
J. Cloud Comput., December, 2024

Model Reduction for Grid-Forming Hybrid Renewable Energy Microgrid Clusters Based on Multi-Timescale Characterization.
IEEE Trans. Smart Grid, 2024

Data privacy protection model based on blockchain in mobile edge computing.
Softw. Pract. Exp., 2024

ZDDR: A Zero-Shot Defender for Adversarial Samples Detection and Restoration.
IEEE Access, 2024

Blockchain-Based Device Reputation Assessment in the Industrial Internet of Things.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing.
J. Cloud Comput., December, 2023

Neighborhood contrastive representation learning for attributed graph clustering.
Neurocomputing, December, 2023

An improved constrained Bayesian probabilistic matrix factorization algorithm.
Soft Comput., May, 2023

Evaluating Ethereum Reentrancy Detection Tools via Mutation Testing.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

CD-Net: Cross-Domain Description and Detection for 2D-3D Learning Local Features.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

An Updatable Key Management Scheme for Underwater Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Approach of Code Summary Generation Using Multi-Feature Fusion Based on Transformer.
Proceedings of the Web Information Systems and Applications, 2023

2022
Secure storage scheme of trajectory data for digital tracking mechanism.
Int. J. Intell. Syst., December, 2022

Design of vehicle certification schemes in IoV based on blockchain.
World Wide Web, 2022

A New Secure Crowdfunding Transaction Scheme Based on Blockchain.
J. Circuits Syst. Comput., 2022

Dual Contrastive Attributed Graph Clustering Network.
CoRR, 2022

Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Code Search Method Based on Multimodal Representation.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Code Comments Generation with Data Flow-Guided Transformer.
Proceedings of the Web Information Systems and Applications, 2022

2021
Blockchain-based mobile edge computing system.
Inf. Sci., 2021

Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing.
IEEE Internet Things J., 2021

Multi-scale graph attention subspace clustering network.
Neurocomputing, 2021

The Code Generation Method Based on Gated Attention and InterAction-LSTM.
Proceedings of the Web Information Systems and Applications, 2021

2020
Securing transmissions by friendly jamming scheme in wireless networks.
J. Parallel Distributed Comput., 2020

A new load balancing strategy by task allocation in edge computing based on intermediary nodes.
EURASIP J. Wirel. Commun. Netw., 2020

Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing.
Complex., 2020

A Location-Based Path Privacy Protection Scheme in Internet of Vehicles.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Classification Algorithm for Real Collar Images.
Proceedings of the Intelligent Computing Theories and Application, 2020

Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Distributed Link Scheduling Algorithm Based on Successive Interference Cancellation in MIMO Wireless Networks.
Wirel. Commun. Mob. Comput., 2019

Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing.
Sensors, 2019

Improved Marching Cubes Algorithm For 3d Multi-slice Spiral Computed Tomography In the Diagnosis of Bone and Joint Diseases.
J. Medical Imaging Health Informatics, 2019

Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing.
IEEE Access, 2019

Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing.
IEEE Access, 2019

2018
Data Processing Delay Optimization in Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Method of Resource Estimation Based on QoS in Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing.
Sci. Program., 2018

DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things.
Proceedings of the 2018 International Conference on Identification, 2018

Trajectory Privacy Protection Method Based on Location Service in Fog Computing.
Proceedings of the 2018 International Conference on Identification, 2018

RFID Location Algorithm Based on Target Search and Repeat Calibration.
Proceedings of the 2018 International Conference on Identification, 2018

Evolutionary computation plus dynamic programming for the bi-objective travelling thief problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

A Fully Polynomial Time Approximation Scheme for Packing While Traveling.
Proceedings of the Algorithmic Aspects of Cloud Computing - 4th International Symposium, 2018

2017
分裂二进制追踪树标签防碰撞协议 (Novel Tag Anticollision Protocol with Splitting Binary Tracking Tree).
计算机科学, 2017

Exact Approaches for the Travelling Thief Problem.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017

A New Weighted Connection-Least Load Balancing Algorithm Based on Delay Optimization Strategy.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
Conics arising from external points and their binary codes.
Des. Codes Cryptogr., 2016

Fast and Effective Optimisation of Arrays of Submerged Wave Energy Converters.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

On the Impact of the Renting Rate for the Unconstrained Nonlinear Knapsack Problem.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

2014
Proofs of two conjectures on the dimensions of binary codes.
Des. Codes Cryptogr., 2014

2-Ranks of incidence matrices associated with conics in finite projective planes.
Des. Codes Cryptogr., 2014

2013
An empirical study on clustering for isolating bugs in fault localization.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Fast and effective multi-objective optimisation of wind turbine placement.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

2012
Power sums over subspaces of finite fields.
Finite Fields Their Appl., 2012

On binary codes from conics in PG(2, q).
Eur. J. Comb., 2012

2011
Dimensions of some binary codes arising from a conic in PG(2, q).
J. Comb. Theory A, 2011

2010
Chunk Parsing and Entity Relation Extracting to Chinese Text by Using Conditional Random Fields Model.
J. Intell. Learn. Syst. Appl., 2010

2008
Congestion Aware High Level Synthesis Combined with Floorplanning.
Proceedings of the PACIIA 2008, 2008

2007
The Fourth Party Logistics Service Bus Based on SOA.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Verification of Circuits Including Black Box Based on TED.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
Sharing Methods of Multi-objective Functions Based on TED.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2004
Slicing Web Application Based on Hyper Graph.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004


  Loading...