default search action
Dejun Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Can Zhao, Yibing Wang, Dejun Wang, Guangyan Sun, Bo Meng:
A Language-independent Quantitative Analysis Method on Conformance between Legal Contract and Smart Contract. Distributed Ledger Technol. Res. Pract. 3(3): 18:1-18:17 (2024) - [j33]Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng:
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator. IET Blockchain 4(2): 209-221 (2024) - [j32]Shuhang Yang, Yanqiu Xing, Dejun Wang, Hangyu Deng:
A Novel Point Cloud Adaptive Filtering Algorithm for LiDAR SLAM in Forest Environments Based on Guidance Information. Remote. Sens. 16(15): 2714 (2024) - [j31]Jie Tang, Yanqiu Xing, Jiaqi Wang, Hong Yang, Dejun Wang, Yuanxin Li, Aiting Zhang:
A Multilevel Autoadaptive Denoising Algorithm Based on Forested Terrain Slope for ICESat-2 Photon-Counting Data. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 16831-16846 (2024) - [j30]Dejun Wang, Tianbiao Gu, Kairan Zhang:
Fault Tolerant Control of 4-Wheel Independent Drive Vehicle Subject to Actuator Faults Based on Feasible Region. IEEE Trans. Veh. Technol. 73(2): 1652-1666 (2024) - [c24]Dejun Wang:
DDR-ECC: Dictionary-Driven Chinese ASR Entity Correction with Controllable Decoding. NLPCC (4) 2024: 252-264 - 2023
- [j29]Binhao Ma, Can Zhao, Dejun Wang, Bo Meng:
DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio. Comput. Secur. 129: 103212 (2023) - [j28]Can Zhao, Qin Liu, Zonghua Hu, Ze Yu, Dejun Wang, Bo Meng:
K-Go: An executable formal semantics of Go language in K framework. IET Blockchain 3(2): 61-73 (2023) - [j27]Dejun Wang, Zhenqing Duan, Wenbin Wang, Jingchun Chu, Qingru Cui, Runze Zhu, Yahui Cui, You Zhang, Zedong You:
Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data. IET Cyper-Phys. Syst.: Theory & Appl. 8(4): 272-279 (2023) - [j26]Binhao Ma, Jiahui Wang, Dejun Wang, Bo Meng:
Multidomain active defense: Detecting multidomain backdoor poisoned samples via ALL-to-ALL decoupling training without clean datasets. Neural Networks 168: 350-362 (2023) - [j25]Yang Liu, Yongting Deng, Hongwen Li, Jianli Wang, Dejun Wang:
Precise and Efficient Pointing Control of a 2.5-m-Wide Field Survey Telescope Using ADRC and Nonlinear Disturbance Observer. Sensors 23(13): 6068 (2023) - [c23]Can Zhao, Xiaoxiao Wang, Zhengzhu Lu, Jiahui Wang, Dejun Wang, Bo Meng:
HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature. FICC (2) 2023: 541-562 - [c22]Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng:
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. ProvSec 2023: 115-130 - [i2]Binhao Ma, Jiahui Wang, Dejun Wang, Bo Meng:
Poison Dart Frog: A Clean-Label Attack with Low Poisoning Rate and High Attack Success Rate in the Absence of Training Data. CoRR abs/2308.09487 (2023) - 2022
- [j24]Di Wu, Lihua Cao, Pengji Zhou, Ning Li, Yi Li, Dejun Wang:
Infrared Small-Target Detection Based on Radiation Characteristics with a Multimodal Feature Fusion Network. Remote. Sens. 14(15): 3570 (2022) - [j23]Daosen Liu, Shengsheng Wei, Dejun Wang:
Improving the Sensing Properties of Graphene MEMS Pressure Sensor by Low-Temperature Annealing in Atmosphere. Sensors 22(20): 8082 (2022) - [c21]Yingjie Zhu, Jiageng Ma, Xiangqun Yang, Yiwen Wang, Han Li, Dejun Wang:
Research on the quality of graduate students in provincial universities based on entropy weight TOPSIS and RSR - take changchun university as an example. CIS 2022: 190-194 - [c20]Dejun Wang, Yanxia Wang, Huixia Shi, Shaojun Gan, Shan Liang:
Predicting Ship Speed in the Inland Waterways with LSTM Network. ICITE 2022: 35-39 - [c19]Dejun Wang, Yanxia Wang, Shan Liang, Chengyang Ye:
A N-order Interpolated Variance Estimator Algorithm for Fusion of Inland Waterway Crowd-sourced Bathymetry Data. ICITE 2022: 66-71 - [c18]Hui Xie, Dejun Wang, Shaojun Gan, Zechen Li, Shan Liang:
Intelligent Vessel Scheduling System for the Controlled inland Waterway Based CPS*. ITSC 2022: 85-90 - [c17]Dejun Wang, Beier Sun, Zhihui Li, Zonghua Hu, Yuze, Duanwei:
Research On Dialogue Management Model Based On A3C Algorithm. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2406-2412 - [c16]Dejun Wang, Hebin Hu, Yilin Kang, Yi Zhang, Zhida Guo, Tenglong Yu:
Policy2Graph: A Structure-aware Perspective on Constructing Policy Knowledge Graph for Smart Governance. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2483-2490 - 2021
- [j22]Xurui Zheng, Fuyong Zheng, Xianming Liu, Dejun Wang, Jun Wang, Bo Meng:
A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy. IEEE Access 9: 14945-14957 (2021) - 2020
- [j21]Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng:
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus. IEEE Access 8: 26623-26636 (2020) - [j20]Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng:
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model. Int. J. Netw. Secur. 22(1): 80-92 (2020)
2010 – 2019
- 2019
- [j19]Dejun Wang, Qianhui Yang, Pingxin Ge:
Diffeomorphism Transformation Based Disturbance Rejection Control and Its Allocation of Vehicle Dynamic Stable Systems. IEEE Access 7: 105734-105745 (2019) - [j18]Xudong He, Jiabing Liu, Chin-Tser Huang, Dejun Wang, Bo Meng:
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology. IEEE Access 7: 131050-131067 (2019) - 2018
- [j17]Lili Yao, Jintian Lu, Jiabing Liu, Dejun Wang, Bo Meng:
A Secure and Efficient Distributed Storage Scheme SAONT-RS Based on an Improved AONT and Erasure Coding. IEEE Access 6: 55126-55138 (2018) - [j16]Lili Yao, Jiabing Liu, Dejun Wang, Jing Li, Bo Meng:
Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model. Int. J. Netw. Secur. 20(6): 1125-1136 (2018) - [j15]Dejun Wang, Zhuo Qu, Jiannan Ding:
Tire Force Distribution Method With the Constraints of Executable Drive Space Consideration. IEEE Trans. Veh. Technol. 67(12): 11427-11439 (2018) - 2017
- [j14]Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang:
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model. Int. J. Netw. Secur. 19(1): 138-153 (2017) - 2016
- [j13]Dejun Wang, Weiping Sun, Shengsheng Yu, Lin Li, Wei Liu:
A novel background-weighted histogram scheme based on foreground saliency for mean-shift tracking. Multim. Tools Appl. 75(17): 10271-10289 (2016) - 2015
- [j12]Haiyun Huang, Dejun Wang, Yue Xu:
A Monolithic CMOS Magnetic Hall Sensor with High Sensitivity and Linearity Characteristics. Sensors 15(10): 27359-27373 (2015) - 2014
- [j11]Dejun Wang, Kai Chen, Weiping Sun, Shengsheng Yu, Hanbing Wang:
Efficient Mean-Shift Tracking Using an Improved Weighted Histogram Scheme. KSII Trans. Internet Inf. Syst. 8(6): 1964-1981 (2014) - [j10]Dejun Wang, Shiyao Song:
Robust Model-Based Sensor Fault Monitoring System for Nonlinear Systems in Sensor Networks. Sensors 14(10): 19138-19161 (2014) - [c15]Wei Xu, Dejun Wang, Ying Li:
The lateral stability control of vehicles based on sliding mode method. ICIA 2014: 1312-1317 - [c14]Dejun Wang, Yongtao Shi, Weiping Sun, Shengsheng Yu:
Object Tracking with a Novel Method Based on FS-CBWH within Mean-Shift Framework. ISNN 2014: 508-515 - [c13]Dejun Wang, Lin Li, Wei Liu, Weiping Sun, Shengsheng Yu:
Bayesian Covariance Tracking with Adaptive Feature Selection. ISNN 2014: 516-523 - 2013
- [j9]Yang Liu, Hang Sun, Dejun Wang:
Updating the Finite Element Model of Large-Scaled Structures using Component mode Synthesis Technique. Intell. Autom. Soft Comput. 19(1): 11-21 (2013) - [j8]Dejun Wang, Bo Meng, Shaomin Jin:
Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks. J. Networks 8(12): 2922-2926 (2013) - 2011
- [j7]Bo Meng, Wei Huang, Dejun Wang:
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model. J. Networks 6(9): 1262-1271 (2011) - [j6]Haipeng Zhang, Ruisheng Qi, Liang Zhang, Buchun Su, Dejun Wang:
Vertical Gate RF SOI LIGBT for SPICs with Significantly Improved Latch-Up Immunity. VLSI Design 2011: 548546:1-548546:9 (2011) - [c12]Dejun Wang:
Research on Heterogeneous Resource Sharing and Dynamic Allocation Strategy in Campus Grid. ICFCE 2011: 845-851 - 2010
- [j5]Bo Meng, Wei Huang, Zimao Li, Dejun Wang:
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus. J. Digit. Content Technol. its Appl. 4(7): 88-107 (2010) - [c11]Haipeng Zhang, Liang Zhang, Dejun Wang, Guohua Liu, Mi Lin, Xiaoyan Niu, Lingyan Fan:
Negative ESD robustness of a novel anti-ESD TGFPTD SOI LDMOS. APCCAS 2010: 1227-1230 - [i1]Xiaohui Xu, Linpeng Huang, Dejun Wang, Jun-Qing Chen:
A Calculus of Consistent Component-based Software Updates. CoRR abs/1011.6496 (2010)
2000 – 2009
- 2009
- [c10]Ruonan Rao, Jiankun Wu, Dejun Wang, Linpeng Huang:
Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM. ACIS-ICIS 2009: 840-845 - 2008
- [j4]Hailin Jin, Daniel Cremers, Dejun Wang, Emmanuel Prados, Anthony J. Yezzi, Stefano Soatto:
3-D Reconstruction of Shaded Objects from Multiple Images Under Unknown Illumination. Int. J. Comput. Vis. 76(3): 245-256 (2008) - [j3]Jiankun Wu, Linpeng Huang, Dejun Wang:
ASM-based model of dynamic service update in OSGi. ACM SIGSOFT Softw. Eng. Notes 33(2) (2008) - [j2]Jiankun Wu, Linpeng Huang, Dejun Wang, Fei Shen:
R-OSGi-based architecture of distributed smart home system. IEEE Trans. Consumer Electron. 54(3): 1166-1172 (2008) - [c9]Dejun Wang, Linpeng Huang, Jiankun Wu, Xiaohui Xu:
Dynamic Software Upgrading for Distributed System Based on R-OSGI. CSSE (3) 2008: 227-231 - 2007
- [c8]Xiaohui Xu, Linpeng Huang, Dejun Wang:
Supporting Dynamic Updates of Componentized Service. IEEE SCC 2007: 699-700 - [c7]Jiankun Wu, Linpeng Huang, Jian Cao, Minglu Li, Dejun Wang, Mingwen Wang:
Research on Modeling of Complicate Traffic Simulation System. HCI (12) 2007: 1037-1046 - [c6]Jiankun Wu, Linpeng Huang, Dejun Wang:
Research on Dynamic Updating of Grid Service. International Conference on Computational Science (2) 2007: 1107-1114 - 2006
- [c5]Dejun Wang, Linpeng Huang, Qinglei Zhang:
A Workflow-Oriented Scripting Language Based on BPEL4WS. APWeb Workshops 2006: 690-697 - [c4]Dejun Wang, Stefano Soatto, Emmanuel Prados:
Towards Robust and Physically Plausible Shaded Stereoscopic Segmentation. CVPR Workshops 2006: 171 - 2004
- [c3]Dejun Wang, Jiali Zhao, Seok-Cheol Kee, Zesheng Tang:
Level Set Methods, Distance Function and Image Segmentation. ICPR (2) 2004: 110-115 - [c2]Dejun Wang, Jiali Zhao, Seok-Cheol Kee:
A novel heat kernel based Monte Carlo localization algorithm. IROS 2004: 2494-2499 - 2003
- [j1]Jiali Zhao, Yong Su, Dejun Wang, Siwei Luo:
Illumination ratio image: synthesizing and recognition with varying illuminations. Pattern Recognit. Lett. 24(15): 2703-2710 (2003) - 2001
- [c1]Hongchuan Yu, Dejun Wang, Zesheng Tang:
Level Set Methods and Image Segmentation. MIAR 2001: 204-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-29 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint