default search action
Bi Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Bi Wang, Qin Su, Haike Qiao, Canyou Wang:
Prevention and adaptation of intermodal interactive seaports and dry ports under asymmetric risk behavior. Comput. Ind. Eng. 195: 110447 (2024) - [j15]Yishan Chen, Shumei Ye, Jianqing Wu, Bi Wang, Hui Wang, Wei Li:
Fast multi-type resource allocation in local-edge-cloud computing for energy-efficient service provision. Inf. Sci. 668: 120502 (2024) - [j14]Yang Chen, Dechang Pi, Bi Wang, Ali Wagdy Mohamed, Junfu Chen, Yintong Wang:
Equilibrium optimizer with generalized opposition-based learning for multiple unmanned aerial vehicle path planning. Soft Comput. 28(7): 6185-6198 (2024) - [j13]Yang Chen, Dechang Pi, Shengxiang Yang, Yue Xu, Bi Wang, Yintong Wang:
A multi-strategy optimizer for energy minimization of multi-UAV-assisted mobile edge computing. Swarm Evol. Comput. 91: 101748 (2024) - [j12]Bi Wang, Xuelian Li, Yang Chen, Jianqing Wu, Bowen Zeng, Junfu Chen:
Continuous Control With Swarm Intelligence Based Value Function Approximation. IEEE Trans Autom. Sci. Eng. 21(1): 976-988 (2024) - [c9]Shuxin Yang, Zexin Zhang, Bi Wang, Jianqing Wu:
DCS-YOLOv8: An Improved Steel Surface Defect Detection Algorithm Based on YOLOv8. ICIGP 2024: 39-46 - 2023
- [j11]Bi Wang, Kwai-Sang Chin, Qin Su:
Port investments to address diversified risks under risk-sensitive behavior: Prevention or adaptation? Comput. Ind. Eng. 179: 109153 (2023) - [c8]Pengbin Li, Zhengyi Hou, Hanran Gao, Bi Wang, Zhaohao Wang:
A Reconfigurable and Machine Learning attack resistant strong PUF based on Arbiter Mechanism and SOT-MRAM. NANOARCH 2023: 22:1-22:4 - 2022
- [j10]Yang Chen, Dechang Pi, Bi Wang, Junfu Chen, Yue Xu:
Bi-subgroup optimization algorithm for parameter estimation of a PEMFC model. Expert Syst. Appl. 196: 116646 (2022) - [j9]Bi Wang, Jianqing Wu, Xuelian Li, Jun Shen, Yangjun Zhong:
Uncertainty quantification for operators in online reinforcement learning. Knowl. Based Syst. 258: 109998 (2022) - [c7]Anni Cao, Xin Li, Liang Wang, Jianpeng Zhang, Chunliang Gou, Liquan Liu, Bi Wang, Xing Zhang, Yuanfu Zhao:
Total Dose and Single Event Effects on 16 Mbit Standalone Spin-Transfer Torque MRAM with 45 nm CMOS Technology. APCCAS 2022: 528-531 - [c6]Zhengyi Hou, Luyao Shi, Bi Wang, Zhaohao Wang:
Approximate computation based on NAND-SPIN MRAM for CNN on-chip training. NANOARCH 2022: 14:1-14:2 - [c5]Jiapeng Tang, Lev Markhasin, Bi Wang, Justus Thies, Matthias Nießner:
Neural Shape Deformation Priors. NeurIPS 2022 - [i2]Jiapeng Tang, Lev Markhasin, Bi Wang, Justus Thies, Matthias Nießner:
Neural Shape Deformation Priors. CoRR abs/2210.05616 (2022) - 2021
- [j8]Bi Wang, Xuelian Li, Zhiqiang Gao, Chen Yang:
Gradient compensation traces based temporal difference learning. Neurocomputing 442: 221-235 (2021) - [j7]Bi Wang, Yang Chen, Xuelian Li, Junfu Chen:
Lifelong Classification in Open World With Limited Storage Requirements. Neural Comput. 33(7): 1818-1852 (2021) - [c4]Deming Zhang, Xian Wang, Kaili Zhang, Lang Zeng, You Wang, Bi Wang, Erya Deng, Chuanjie Wang, Peng Wu, Youguang Zhang, Weisheng Zhao:
Fully Single Event Double Node Upset Tolerant Design for Magnetic Random Access Memory. ISCAS 2021: 1-5 - [c3]Bi Wang, Zhaohao Wang, Min Wang, Weisheng Zhao, Liang Wang, Yuanfu Zhao:
Soft Error Sensitivity of Magnetic Random Access Memory and Its Radiation Hardening Design. ISOCC 2021: 199-200 - [c2]Shangyin Gao, Lev Markhasin, Bi Wang:
Spatial Cross-Attention RGB-D Fusion Module for Object Detection. MMSP 2021: 1-6 - [i1]Junfu Chen, Yang Chen, Bi Wang:
Cross-Subject Domain Adaptation for Multi-Frame EEG Images. CoRR abs/2106.06769 (2021) - 2020
- [j6]Bi Wang, Xuelian Li, Zhiqiang Gao, Yangjun Zhong:
Risk Aversion Operator for Addressing Maximization Bias in Q-Learning. IEEE Access 8: 43098-43110 (2020) - [j5]Xuelian Li, Bi Wang, Lixin Li, Zhiqiang Gao, Qian Liu, Hancheng Xu, Lanting Fang:
Deep2s: Improving Aspect Extraction in Opinion Mining With Deep Semantic Representation. IEEE Access 8: 104026-104038 (2020) - [j4]Elin Chen, Junfu Chen, Ali Wagdy Mohamed, Bi Wang, Zhendong Wang, Yang Chen:
Swarm Intelligence Application to UAV Aided IoT Data Acquisition Deployment Optimization. IEEE Access 8: 175660-175668 (2020)
2010 – 2019
- 2019
- [j3]Xuelian Li, Shang Zhang, Bi Wang, Zhiqiang Gao, Lanting Fang, Hancheng Xu:
A Hybrid Framework for Problem Solving of Comparative Questions. IEEE Access 7: 185961-185976 (2019) - [j2]Bi Wang, Zhaohao Wang, Bi Wu, Yumeng Bai, Kaihua Cao, Yuanfu Zhao, Youguang Zhang, Weisheng Zhao:
Novel Radiation Hardening Read/Write Circuits Using Feedback Connections for Spin-Orbit Torque Magnetic Random Access Memory. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(5): 1853-1862 (2019) - 2018
- [c1]Bi Wang, Zhaohao Wang, Kaihua Cao, Youguang Zhang, Yuanfu Zhao, Weisheng Zhao:
Radiation hardening design for spin-orbit torque magnetic random access memory. ISCAS 2018: 1-4 - 2017
- [j1]Shui-Ping Zhang, Bi Wang, Xue-Jiao Wang:
A dynamic search space strategy for swarm intelligence. Int. J. Comput. Sci. Eng. 15(1/2): 21-31 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint