Junyuan Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
An Integrated Pipeline for Phenotypic Characterization, Clustering and Visualization of Patient Cohorts in a Rare Disease-Oriented Clinical Data Warehouse.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024

Tight Differentiable Relaxation of Sum Ergodic Capacity Maximization for Clustered Cell-Free Networking.
Proceedings of the IEEE International Symposium on Information Theory, 2024

vCrypto: a Unified Para-Virtualization Framework for Heterogeneous Cryptographic Resources.
Proceedings of the IEEE INFOCOM 2024, 2024

Multi-Attribute Dynamic Learning for 3D Face Reconstruction and Dense Alignment in the Unconstrained Environment.
Proceedings of the International Joint Conference on Neural Networks, 2024

A Sequential Min K-Cut Approach for Sum Rate Maximization of Clustered Cell-Free Networking.
Proceedings of the IEEE International Conference on Communications, 2024

Double Splitting Model and Generalized Moment Passing Method for Network Capacity Computation.
Proceedings of the IEEE International Conference on Communications, 2024

HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2023

Utilizing Latent Codes for Minting AI-Generated Digital Assets into NFTs.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2019
WGM: Wavelet-Based Gamma Model for Video Traffic in Wireless Multi-hop Networks.
Wirel. Pers. Commun., 2019

2018
Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2016
A study of HSM based key protection in encryption file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2008
Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks.
Int. J. Commun. Netw. Syst. Sci., 2008


  Loading...