Manxi Wang

According to our database1, Manxi Wang authored at least 14 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GP-DGECN: Geometric Prior Dynamic Group Equivariant Convolutional Networks for Specific Emitter Identification.
IEEE Open J. Commun. Soc., 2024

2023
Few-shot learning based blind parameter estimation for multiple frequency-hopping signals.
Multidimens. Syst. Signal Process., March, 2023

Shift-invariant universal adversarial attacks to avoid deep-learning-based modulation classification.
Int. J. Commun. Syst., 2023

2021
Cascaded object detection networks for FMCW radars.
Signal Image Video Process., 2021

A UAV-aided channel sounder for air-to-ground channel measurements.
Phys. Commun., 2021

Subway passenger flow analysis and management optimization model based on AFC data.
J. Intell. Fuzzy Syst., 2021

Machine Learning Based Angle Estimation for Air-to-Ground Channel Measurements.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

2019
Resource Allocation for Threat Defense in Cyber-security IoT system.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

2018
Cooperative Dynamic Game-Based Optimal Power Control in Wireless Sensor Network Powered by RF Energy.
Sensors, 2018

Distributed constrained optimisation over cloud-based multi-agent networks.
Int. J. Sens. Networks, 2018

2017
Fault Diagnosis and Health Assessment for Super-Heterodyne Receivers Based on ITD-SVD and LR.
Proceedings of the Communications, Signal Processing, and Systems, 2017

2016
Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Robust group LASSO over decentralized networks.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

2015
An heuristic WSPRT fusion algorithm against high proportion of malicious users.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015


  Loading...