default search action
Weilong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Chenghao Zhang, Yingjie Wang, Weilong Wang, Haijing Zhang, Zhaowei Liu, Xiangrong Tong, Zhipeng Cai:
A Personalized Location Privacy Protection System in Mobile Crowdsourcing. IEEE Internet Things J. 11(6): 9995-10006 (2024) - [j23]Xuelei Sun, Yingjie Wang, Peiyong Duan, Qasim Zia, Weilong Wang, Zhipeng Cai:
Bilateral Privacy Protection Scheme Based on Adaptive Location Generalization and Grouping Aggregation in Mobile Crowdsourcing. IEEE Internet Things J. 11(10): 17740-17756 (2024) - [j22]Weilong Wang, Guoliang Zhang:
A Hybrid Two-Grid Algorithm for the Steady Magnetohydrodynamic System. J. Sci. Comput. 101(3): 64 (2024) - [j21]Tian Yang, Weilong Wang, Bo Zhao, Lixin Wang, Xiaodong Ding, Chen Liang, Zheng Shan:
A processor architecture design method for improving reusability of special-purpose superconducting quantum processor. Quantum Inf. Process. 23(6): 200 (2024) - [j20]Hua Chen, Jiaxiong Fang, Weilong Wang, Wei Liu, Ye Tian, Qing Wang, Gang Wang:
Near-Field Target Localization for EMVS-MIMO Radar With Arbitrary Configuration. IEEE Trans. Aerosp. Electron. Syst. 60(4): 5406-5417 (2024) - [j19]Zhongwei Zhan, Yingjie Wang, Peiyong Duan, Akshita Maradapu Vera Venkata Sai, Zhaowei Liu, Chaocan Xiang, Xiangrong Tong, Weilong Wang, Zhipeng Cai:
Enhancing Worker Recruitment in Collaborative Mobile Crowdsourcing: A Graph Neural Network Trust Evaluation Approach. IEEE Trans. Mob. Comput. 23(10): 10093-10110 (2024) - [c4]Yingxin Li, Weilong Wang, Yingjie Wang, Tong Xiangrong, Peiyong Duan, Zhipeng Cai:
Personalized Privacy Protection Incentive Mechanism for Mobile Crowdsourcing Based on Homomorphic Encryption and Edge Computing. ICWS 2024: 1371-1376 - [i5]Shengfang Zhai, Weilong Wang, Jiajun Li, Yinpeng Dong, Hang Su, Qingni Shen:
Discovering Universal Semantic Triggers for Text-to-Image Synthesis. CoRR abs/2402.07562 (2024) - [i4]Zhangyu Wang, Lantian Xu, Zhifeng Kong, Weilong Wang, Xuyu Peng, Enyang Zheng:
A Geometry-Aware Algorithm to Learn Hierarchical Embeddings in Hyperbolic Space. CoRR abs/2407.16641 (2024) - 2023
- [j18]Weilong Wang:
Novel pressure-correction schemes based on scalar auxiliary variable method for the MHD equations. Appl. Math. Comput. 437: 127550 (2023) - [j17]Weilong Wang, Tianyi Zhao, Hao Dong, Minghong Zhu, Zheng Zhou, Hua Chen, Weiyue Liu:
Spatial-Temporal-Based 3-D Parameters Estimation Method for Near-Field Sources Using Parallel Factor Model. Circuits Syst. Signal Process. 42(10): 6367-6378 (2023) - [j16]Weilong Wang, Hua Chen, Wei Liu, Qing Wang, Gang Wang:
Trilinear decomposition based near-field source localization with MIMO velocity vector sensor arrays. Signal Process. 210: 109061 (2023) - [j15]Ke Liu, Xiaotao Guo, Tianxin Liu, Weilong Wang:
Design, Fabrication, and Measurement Study of a Planar Phased Array Antenna. IEEE Trans. Instrum. Meas. 72: 1-9 (2023) - [j14]Weilong Wang, Yingjie Wang, Peiyong Duan, Tianen Liu, Xiangrong Tong, Zhipeng Cai:
A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile Crowdsourcing. IEEE Trans. Mob. Comput. 22(10): 5625-5642 (2023) - [j13]Hua Chen, Weilong Wang, Wei Liu, Ye Tian, Gang Wang:
An Exact Near-Field Model Based Localization for Bistatic MIMO Radar With COLD Arrays. IEEE Trans. Veh. Technol. 72(12): 16021-16030 (2023) - [c3]Shengfang Zhai, Qingni Shen, Xiaoyi Chen, Weilong Wang, Cong Li, Yuejian Fang, Zhonghai Wu:
NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning. ICASSP 2023: 1-5 - [i3]Shengfang Zhai, Qingni Shen, Xiaoyi Chen, Weilong Wang, Cong Li, Yuejian Fang, Zhonghai Wu:
NCL: Textual Backdoor Defense Using Noise-augmented Contrastive Learning. CoRR abs/2303.01742 (2023) - [i2]Zhongwei Zhan, Yingjie Wang, Peiyong Duan, Akshita Maradapu Vera Venkata Sai, Zhaowei Liu, Chaocan Xiang, Xiangrong Tong, Weilong Wang, Zhipeng Cai:
Efficient Recruitment Strategy for Collaborative Mobile Crowd Sensing Based on GCN Trustworthiness Prediction. CoRR abs/2306.04366 (2023) - 2022
- [j12]Weilong Wang, Yingjie Wang, Yan Huang, Chunxiao Mu, Zice Sun, Xiangrong Tong, Zhipeng Cai:
Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing. Comput. Networks 215: 109206 (2022) - [j11]Benzheng Yuan, Weilong Wang, Fudong Liu, Haoran He, Zheng Shan:
Comparison of Lumped Oscillator Model and Energy Participation Ratio Methods in Designing Two-Dimensional Superconducting Quantum Chips. Entropy 24(6): 792 (2022) - [j10]Haoran He, Weilong Wang, Fudong Liu, Benzheng Yuan, Zheng Shan:
Suppressing the Dielectric Loss in Superconducting Qubits through Useful Geometry Design. Entropy 24(7): 952 (2022) - [j9]Alexandre Jacquillat, Vikrant Vaze, Weilong Wang:
Primary versus secondary infrastructure capacity allocation mechanisms. Eur. J. Oper. Res. 303(2): 668-687 (2022) - [j8]Zhuoran Lu, Patrick Li, Weilong Wang, Ming Yin:
The Effects of AI-based Credibility Indicators on the Detection and Spread of Misinformation under Social Influence. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-27 (2022) - [j7]Xiaoli Li, Weilong Wang, Jie Shen:
Stability and Error Analysis of IMEX SAV Schemes for the Magneto-Hydrodynamic Equations. SIAM J. Numer. Anal. 60(3): 1026-1054 (2022) - [c2]Yixuan Liu, Weilong Wang, Baolong Liu, Andrew B. Whinston:
Twisting the Toll: Electric Vehicles and Information Provision. ICIS 2022 - 2021
- [i1]Xiaoli Li, Weilong Wang, Jie Shen:
Stability and error analysis of IMEX SAV schemes for the magneto-hydrodynamic equations. CoRR abs/2104.00229 (2021) - 2020
- [j6]Cong Peng, Shanghong Zhao, Ruixin Li, Jun Li, Weilong Wang, Hanghang Gao:
Separated traffic grooming for Low Earth Orbit (LEO) optical satellite networks with wavelength dimensioning. Int. J. Satell. Commun. Netw. 38(6): 499-511 (2020) - [j5]Cong Peng, Shanghong Zhao, Jun Li, Yongjun Li, Weilong Wang, Hanghang Gao:
Provision of traffic grooming for distributed satellite cluster networks. Int. J. Satell. Commun. Netw. 38(6): 557-574 (2020) - [j4]Fenghua Tong, Weilong Wang, Xinlong Feng, Jianping Zhao, Zhilin Li:
How to obtain an accurate gradient for interface problems? J. Comput. Phys. 405: 109070 (2020) - [j3]Weilong Wang, Xiangdong Meng, Yangyang Fei, Zhi Ma:
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator. Quantum Inf. Process. 19(7): 196 (2020) - [j2]Weilong Wang, Jun Wei, Shanghong Zhao, Yongjun Li, Yongxing Zheng:
Energy efficiency resource allocation based on spectrum-power tradeoff in distributed satellite cluster network. Wirel. Networks 26(6): 4389-4402 (2020) - [c1]Jiajian Wang, Hu Liu, Zhiqun Pan, Weilong Wang, Lulu Zhang, Zilong Liu:
A New State Evaluation Algorithm for Rail Transit Power Supply System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 318-322
2010 – 2019
- 2019
- [j1]Weilong Wang, Shanghong Zhao, Yongxing Zheng, Yongjun Li:
Resource Allocation Method of Cognitive Satellite Terrestrial Networks Under Non-Ideal Spectrum Sensing. IEEE Access 7: 7957-7964 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint