default search action
Wenkai Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Gang Yu, Haoran Dong, Wenkai Wang, Aoran Wang, Mingxu Sun, Feng Li:
Wavelet-Enhanced Time-Frequency Analysis Method for Bearing Fault Detection of Rotating Machinery. IEEE Access 12: 120949-120960 (2024) - [j20]Hong Wei, Wenkai Wang, Zhenling Peng, Jianyi Yang:
Q-BioLiP: A Comprehensive Resource for Quaternary Structure-based Protein-ligand Interactions. Genom. Proteom. Bioinform. 22(1) (2024) - [j19]Chuanming Chen, Dongsheng Xu, Qi Jin, Wenkai Wang, Liping Sun, Xiaoyao Zheng, Qingying Yu:
Trajectory outlier detection method based on group division. Intell. Data Anal. 28(2): 415-432 (2024) - [j18]Wenkai Wang, Xiangyang Xu, Hao Yang:
Intelligent Detection of Tunnel Leakage Based on Improved Mask R-CNN. Symmetry 16(6): 709 (2024) - [j17]Wei Yu, Wenkai Wang, Guangquan Xu, Huaming Wu, Hongyan Li, Jun Wang, Xiaoming Li, Juan Liu:
MRFS: Mining Rating Fraud Subgraph in Bipartite Graph for Users and Products. IEEE Trans. Comput. Soc. Syst. 11(3): 3108-3117 (2024) - 2023
- [j16]Jing Ran, Wenkai Wang, Hefei Hu:
Dynamic Service Function Chain Deployment and Readjustment Method Based on Deep Reinforcement Learning. Sensors 23(6): 3054 (2023) - [c11]Wenkai Wang, Lina Zhu, Tom H. Luan, Changle Li:
DoIP: A Parallel Protocol Conversion Gateway for DMR over Internet Protocol. VTC2023-Spring 2023: 1-5 - 2022
- [j15]Wenkai Wang, Zhenling Peng, Jianyi Yang:
Single-sequence protein structure prediction using supervised transformer protein language models. Nat. Comput. Sci. 2(12): 804-814 (2022) - 2021
- [j14]Liang Chang, Wei Chen, Jianbo Huang, Chenzhong Bin, Wenkai Wang:
Exploiting multi-attention network with contextual influence for point-of-interest recommendation. Appl. Intell. 51(4): 1904-1917 (2021) - [j13]Saisai Sun, Wenkai Wang, Zhenling Peng, Jianyi Yang:
RNA inter-nucleotide 3D closeness prediction by deep residual neural networks. Bioinform. 37(8): 1093-1098 (2021) - [j12]Wenkai Wang, Bingwei He, Liwei Zhang:
High-Accuracy Real-Time Fish Detection Based on Self-Build Dataset and RIRD-YOLOv3. Complex. 2021: 4761670:1-4761670:8 (2021)
2010 – 2019
- 2019
- [j11]Wenkai Wang, Zhongxi Hou, Shangqiu Shan, Lili Chen:
Optimal Periodic Control of Hypersonic Cruise Vehicle: Trajectory Features. IEEE Access 7: 3406-3421 (2019) - [j10]Lili Chen, Zheng Guo, Xiaolong Deng, Zhongxi Hou, Wenkai Wang:
Waverider Configuration Design With Variable Shock Angle. IEEE Access 7: 42081-42093 (2019) - [j9]Wenkai Wang, Zhongxi Hou, Xianzhong Gao, Lili Chen:
Lowest-Technical-Merit Design Methodology of Hypersonic Cruise Vehicle. IEEE Access 7: 56480-56491 (2019) - [j8]Wenkai Wang, Zhongxi Hou, Shangqiu Shan, Lili Chen:
Periodically Cruising Hypersonic Vehicle With Active Cooling: An Optimal-Control Based Design Approach. IEEE Access 7: 65486-65505 (2019) - [j7]Hancheng Yu, Wenkai Wang, Wenshi Fan:
An Adaptive Iterative Algorithm for Motion Deblurring Based on Salient Intensity Prior. KSII Trans. Internet Inf. Syst. 13(2): 855-870 (2019) - [j6]Fengjun Shang, Chang Liu, Wenkai Wang:
Hotness-aware page partition management method. Neural Comput. Appl. 31(S-1): 133-146 (2019) - [c10]Wenkai Wang, Liang Chang, Chenzhong Bin, Wen Xuan, Wei Chen, Long Li:
ESN-NER: entity storage network using attention mechanism for chinese NER. AIIPCC 2019: 41:1-41:8 - 2018
- [j5]Fengjun Shang, Yan Li, Qiang Fu, Wenkai Wang, Jiangfan Feng, Li He:
Distributed controllers multi-granularity security communication mechanism for software-defined networking. Comput. Electr. Eng. 66: 388-406 (2018) - 2017
- [j4]Weimin Wu, Hanzi Mao, Yi Wang, Ji Wang, Wenkai Wang, Chen Tian:
CoolConferencing: Enabling Robust Peer-to-Peer Multi-Party Video Conferencing. IEEE Access 5: 25474-25486 (2017) - 2016
- [c9]Zhaowei Liu, Zhongxi Hou, Wenkai Wang:
Effect of bending deformation on flight dynamics of a high-aspect-ratio flying wing. ROBIO 2016: 2057-2062 - 2012
- [j3]HsiuJu Rebecca Yen, Wenkai Wang, Chih-Ping Wei, Sheila Hsuan-Yu Hsu, Hung-Chang Chiu:
Service innovation readiness: Dimensions and performance outcome. Decis. Support Syst. 53(4): 813-824 (2012) - [c8]Huanxin Peng, Andong Sheng, Wenkai Wang:
Pseudo multi-hop distributed consensus algorithm under directed topologies. ICARCV 2012: 1616-1619 - [c7]Huanxin Peng, Wenkai Wang, Guoqing Qi, Andong Sheng:
Second-order distributed consensus with one-bit adaptive quantization. ICARCV 2012: 1626-1629 - [c6]Huanxin Peng, Andong Sheng, Wenkai Wang:
Second-order distributed consensus with modified probabilistic quantization. ICARCV 2012: 1630-1635 - 2011
- [c5]Wenkai Wang, Qiao Cai, Yan Sun, Haibo He:
Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid. GLOBECOM 2011: 1-6 - 2010
- [j2]Wenkai Wang, Husheng Li, Yan Lindsay Sun, Zhu Han:
Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks. EURASIP J. Adv. Signal Process. 2010 (2010) - [c4]Wenkai Wang, Yan Sun, Husheng Li, Zhu Han:
Cross-Layer Attack and Defense in Cognitive Radio Networks. GLOBECOM 2010: 1-6 - [c3]Wenkai Wang, HsuanYu Sheila Hsu, HsiuJu Rebecca Yen, Hung-Chang Chiu, Chih-Ping Wei:
Developing and Validating Service Innovation Readiness. PACIS 2010: 71
2000 – 2009
- 2009
- [c2]Wenkai Wang, Husheng Li, Yan Sun, Zhu Han:
Attack-proof collaborative spectrum sensing in cognitive radio networks. CISS 2009: 130-134 - [c1]Wenkai Wang, Husheng Li, Yan Sun, Zhu Han:
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing. GLOBECOM 2009: 1-6 - 2007
- [j1]Peng Jiang, Haonan Wu, Wenkai Wang, Wei Ma, Xiao Sun, Zuhong Lu:
MiPred: classification of real and pseudo microRNA precursors using random forest prediction model with combined features. Nucleic Acids Res. 35(Web-Server-Issue): 339-344 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint