default search action
Junhua Wu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Musheng Chen, Guowei He, Junhua Wu:
ZDDR: A Zero-Shot Defender for Adversarial Samples Detection and Restoration. IEEE Access 12: 39081-39094 (2024) - [j31]Guangshun Li, Haoyang Wu, Junhua Wu, Zhenqiang Li:
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain. J. Cloud Comput. 13(1): 97 (2024) - [j30]Junhua Wu, Xiangmei Bu, Guangshun Li, Guangwei Tian:
Data privacy protection model based on blockchain in mobile edge computing. Softw. Pract. Exp. 54(9): 1671-1696 (2024) - [j29]Zhuoli Zhao, Xi Luo, Junhua Wu, Jindian Xie, Shaoqing Gong, Qiang Ni, Chun Sing Lai, Loi Lei Lai:
Model Reduction for Grid-Forming Hybrid Renewable Energy Microgrid Clusters Based on Multi-Timescale Characterization. IEEE Trans. Smart Grid 15(2): 1227-1242 (2024) - [c29]Guangshun Li, Xueli Gao, Junhua Wu:
Blockchain-Based Device Reputation Assessment in the Industrial Internet of Things. CSCWD 2024: 2674-2679 - 2023
- [j28]Tong Wang, Junhua Wu, Yaolei Qi, Xiaoming Qi, Juwei Guan, Yuan Zhang, Guanyu Yang:
Neighborhood contrastive representation learning for attributed graph clustering. Neurocomputing 562: 126880 (2023) - [j27]Tiange Zheng, Junhua Wu, Guangshun Li:
IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing. J. Cloud Comput. 12(1): 99 (2023) - [j26]Guodong Wang, Musheng Chen, Junhua Wu, Mingzhe Fan, Qiuming Liu:
An improved constrained Bayesian probabilistic matrix factorization algorithm. Soft Comput. 27(9): 5751-5767 (2023) - [c28]Chao Yang, Junhua Wu:
An Approach of Code Summary Generation Using Multi-Feature Fusion Based on Transformer. WISA 2023: 271-283 - [c27]Zhiyun Guan, Junhua Wu, Guangshun Li, Tielin Wang:
An Updatable Key Management Scheme for Underwater Wireless Sensor Networks. ICA3PP (4) 2023: 474-485 - [c26]Junhua Wu, Zhenqiang Li, Haoyang Wu, Guangshun Li:
CD-Net: Cross-Domain Description and Detection for 2D-3D Learning Local Features. ICPADS 2023: 2833-2834 - [c25]Kaitai Zhu, Xingya Wang, Zhenyu Chen, Song Huang, Junhua Wu:
Evaluating Ethereum Reentrancy Detection Tools via Mutation Testing. ISSRE 2023: 545-555 - 2022
- [j25]Junhua Wu, Tiantian Wang, Guangshun Li, Kan Yu, Chuanwen Luo:
Secure storage scheme of trajectory data for digital tracking mechanism. Int. J. Intell. Syst. 37(12): 12490-12510 (2022) - [j24]Guangshun Li, Guopeng Liang, Junhua Wu, Zhenyu Jin, Wenzhen Feng, Kan Yu:
A New Secure Crowdfunding Transaction Scheme Based on Blockchain. J. Circuits Syst. Comput. 31(16): 2250282:1-2250282:26 (2022) - [j23]Junhua Wu, Zhenyu Jin, Guangshun Li, Zhuqing Xu, Cang Fan, Yuanwang Zheng:
Design of vehicle certification schemes in IoV based on blockchain. World Wide Web 25(5): 2241-2263 (2022) - [c24]Wen Zhou, Junhua Wu:
Code Comments Generation with Data Flow-Guided Transformer. WISA 2022: 168-180 - [c23]Wenjun Wei, Junhua Wu:
Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation. QRS Companion 2022: 477-484 - [c22]Xiao Chen, Junhua Wu:
Code Search Method Based on Multimodal Representation. QRS Companion 2022: 485-491 - [c21]Junhua Wu, Huiru Zhang, Guangshun Li, Kan Yu:
Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things. WASA (1) 2022: 40-51 - [i4]Tong Wang, Guanyu Yang, Junhua Wu, Qijia He, Zhenquan Zhang:
Dual Contrastive Attributed Graph Clustering Network. CoRR abs/2206.07897 (2022) - 2021
- [j22]Tong Wang, Junhua Wu, Zhenquan Zhang, Wen Zhou, Guang Chen, Shasha Liu:
Multi-scale graph attention subspace clustering network. Neurocomputing 459: 302-314 (2021) - [j21]Guangshun Li, Jiabin Cao, Junhua Wu, Xinrong Ren, Haili Yu:
Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing. IEEE Internet Things J. 8(22): 16440-16451 (2021) - [j20]Guangshun Li, Xinrong Ren, Junhua Wu, Wanting Ji, Haili Yu, Jiabin Cao, Ruili Wang:
Blockchain-based mobile edge computing system. Inf. Sci. 561: 70-80 (2021) - [c20]Yuxuan Wang, Junhua Wu:
The Code Generation Method Based on Gated Attention and InterAction-LSTM. WISA 2021: 544-555 - 2020
- [j19]Guangshun Li, Ying Zhang, Maoli Wang, Junhua Wu, Qingyan Lin, Xiaofei Sheng:
Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing. Complex. 2020: 8936064:1-8936064:11 (2020) - [j18]Guangshun Li, Yonghui Yao, Junhua Wu, Xiaoxiao Liu, Xiaofei Sheng, Qingyan Lin:
A new load balancing strategy by task allocation in edge computing based on intermediary nodes. EURASIP J. Wirel. Commun. Netw. 2020(1): 3 (2020) - [j17]Guangshun Li, Xiaofei Sheng, Junhua Wu, Haili Yu:
Securing transmissions by friendly jamming scheme in wireless networks. J. Parallel Distributed Comput. 144: 260-267 (2020) - [c19]Xuexin Zhao, Junhua Wu, Maoli Wang, Guangshun Li, Haili Yu, Wenzhen Feng:
Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network. ICCC 2020: 582-587 - [c18]Xiao Qin, Chengcheng Huang, Junhua Wu, Changan Yuan:
A Classification Algorithm for Real Collar Images. ICIC (1) 2020: 355-366 - [c17]Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao:
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles. INFOCOM Workshops 2020: 665-670
2010 – 2019
- 2019
- [j16]Guangshun Li, Jiahe Yan, Lu Chen, Junhua Wu, Qingyan Lin, Ying Zhang:
Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing. IEEE Access 7: 159688-159697 (2019) - [j15]Guangshun Li, Qingyan Lin, Junhua Wu, Ying Zhang, Jiahe Yan:
Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing. IEEE Access 7: 185131-185139 (2019) - [j14]Junhua Wu, Dezhou Zhang, Xuebing Yi, Fei Luo, Tao Zhang:
Improved Marching Cubes Algorithm For 3d Multi-slice Spiral Computed Tomography In the Diagnosis of Bone and Joint Diseases. J. Medical Imaging Health Informatics 9(5): 962-968 (2019) - [j13]Guangshun Li, Yuncui Liu, Junhua Wu, Dandan Lin, Shuaishuai Zhao:
Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing. Sensors 19(9): 2122 (2019) - [j12]Junhua Wu, Dandan Lin, Guangshun Li, Yuncui Liu, Yanmin Yin:
Distributed Link Scheduling Algorithm Based on Successive Interference Cancellation in MIMO Wireless Networks. Wirel. Commun. Mob. Comput. 2019: 9083282:1-9083282:12 (2019) - 2018
- [j11]Guangshun Li, Shuzhen Xu, Junhua Wu, Heng Ding:
Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing. Sci. Program. 2018: 6860359:1-6860359:13 (2018) - [j10]Guangshun Li, Jianrong Song, Junhua Wu, Jiping Wang:
Method of Resource Estimation Based on QoS in Edge Computing. Wirel. Commun. Mob. Comput. 2018 (2018) - [j9]Guangshun Li, Jiping Wang, Junhua Wu, Jianrong Song:
Data Processing Delay Optimization in Mobile Edge Computing. Wirel. Commun. Mob. Comput. 2018 (2018) - [c16]Frank Neumann, Sergey Polyakovskiy, Martin Skutella, Leen Stougie, Junhua Wu:
A Fully Polynomial Time Approximation Scheme for Packing While Traveling. ALGOCLOUD 2018: 59-72 - [c15]Junhua Wu, Sergey Polyakovskiy, Markus Wagner, Frank Neumann:
Evolutionary computation plus dynamic programming for the bi-objective travelling thief problem. GECCO 2018: 777-784 - [c14]Guangshun Li, Chenglong Li, Junhua Wu, Yanmin Yin:
RFID Location Algorithm Based on _target Search and Repeat Calibration. IIKI 2018: 453-457 - [c13]Guangshun Li, Shuaishuai Zhao, Junhua Wu, Chenglong Li, Yuncui Liu:
DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things. IIKI 2018: 458-462 - [c12]Guangshun Li, Yanmin Yin, Junhua Wu, Shuaishuai Zhao, Dandan Lin:
Trajectory Privacy Protection Method Based on Location Service in Fog Computing. IIKI 2018: 463-467 - [i3]Junhua Wu, Sergey Polyakovskiy, Markus Wagner, Frank Neumann:
Evolutionary Computation plus Dynamic Programming for the Bi-Objective Travelling Thief Problem. CoRR abs/1802.02434 (2018) - 2017
- [j8]Zhanqing Li, Guangshun Li, Junhua Wu, Lingzeng Kong:
分裂二进制追踪树标签防碰撞协议 (Novel Tag Anticollision Protocol with Splitting Binary Tracking Tree). 计算机科学 44(12): 80-85 (2017) - [c11]Guangshun Li, Heng Ding, Junhua Wu, Shuzhen Xu:
A New Weighted Connection-Least Load Balancing Algorithm Based on Delay Optimization Strategy. GSKI (2) 2017: 392-403 - [c10]Junhua Wu, Markus Wagner, Sergey Polyakovskiy, Frank Neumann:
Exact Approaches for the Travelling Thief Problem. SEAL 2017: 110-121 - [i2]Frank Neumann, Sergey Polyakovskiy, Martin Skutella, Leen Stougie, Junhua Wu:
A Fully Polynomial Time Approximation Scheme for Packing While Traveling. CoRR abs/1702.05217 (2017) - [i1]Junhua Wu, Markus Wagner, Sergey Polyakovskiy, Frank Neumann:
Exact Approaches for the Travelling Thief Problem. CoRR abs/1708.00331 (2017) - 2016
- [j7]Adonus L. Madison, Junhua Wu:
Conics arising from external points and their binary codes. Des. Codes Cryptogr. 78(2): 473-491 (2016) - [c9]Junhua Wu, Sergey Polyakovskiy, Frank Neumann:
On the Impact of the Renting Rate for the Unconstrained Nonlinear Knapsack Problem. GECCO 2016: 413-419 - [c8]Junhua Wu, Slava Shekh, Nataliia Y. Sergiienko, Benjamin S. Cazzolato, Boyin Ding, Frank Neumann, Markus Wagner:
Fast and Effective Optimisation of Arrays of Submerged Wave Energy Converters. GECCO 2016: 1045-1052 - 2014
- [j6]Junhua Wu:
Proofs of two conjectures on the dimensions of binary codes. Des. Codes Cryptogr. 70(3): 273-304 (2014) - [j5]Megan Adams, Junhua Wu:
2-Ranks of incidence matrices associated with conics in finite projective planes. Des. Codes Cryptogr. 72(2): 381-404 (2014) - 2013
- [c7]Raymond Tran, Junhua Wu, Christopher Denison, Thomas Ackling, Markus Wagner, Frank Neumann:
Fast and effective multi-objective optimisation of wind turbine placement. GECCO 2013: 1381-1388 - [c6]Yanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao:
An empirical study on clustering for isolating bugs in fault localization. ISSRE (Supplemental Proceedings) 2013: 138-143 - 2012
- [j4]Adonus L. Madison, Junhua Wu:
On binary codes from conics in PG(2, q). Eur. J. Comb. 33(1): 33-48 (2012) - [j3]David B. Chandler, Junhua Wu, Qing Xiang:
Power sums over subspaces of finite fields. Finite Fields Their Appl. 18(4): 791-799 (2012) - 2011
- [j2]Peter Sin, Junhua Wu, Qing Xiang:
Dimensions of some binary codes arising from a conic in PG(2, q). J. Comb. Theory A 118(3): 853-878 (2011) - 2010
- [j1]Junhua Wu, Longxia Liu:
Chunk Parsing and Entity Relation Extracting to Chinese Text by Using Conditional Random Fields Model. J. Intell. Learn. Syst. Appl. 2(3): 139-146 (2010)
2000 – 2009
- 2008
- [c5]Junhua Wu, Chunmei Ma, Baogui Huang:
Congestion Aware High Level Synthesis Combined with Floorplanning. PACIIA (2) 2008: 935-938 - 2007
- [c4]Junhua Wu, Guangshun Li, Xinchuang Liu, Guang-Sheng Ma:
Verification of Circuits Including Black Box Based on TED. CAD/Graphics 2007: 561-564 - [c3]Xiaoqiang Liu, Tingting Shu, Junhua Wu:
The Fourth Party Logistics Service Bus Based on SOA. IMECS 2007: 935-940 - 2006
- [c2]Junhua Wu, Guang-Sheng Ma, Guangshun Li:
Sharing Methods of Multi-objective Functions Based on TED. IMSCCS (2) 2006: 274-278 - 2004
- [c1]Junhua Wu, Baowen Xu, Jixiang Jiang:
Slicing Web Application Based on Hyper Graph. CW 2004: 177-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint