default search action
Junlong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Junlong Wang, Quan Tao, Guangyao Han, Xiaomei Fu, Qing Wang:
Orthogonal Chirp Division Multiplexing Based on Dictionary Theory for Integrated Sonar and Communication System. IEEE Commun. Lett. 28(7): 1688-1692 (2024) - [j7]Mingxuan Ding, Gang Wang, Lingzhe Meng, Jixin Wang, Liquan Wang, Dake Lu, Junlong Wang, Feihong Yun, Peng Jia:
Enhancing Joint Dynamics Modeling for Underwater Robotics Through Stochastic Extension. IEEE Robotics Autom. Lett. 9(9): 8106-8113 (2024) - [c14]Erchen Yu, Junlong Wang, Xuening Qiao, Jiewei Qi, Zhaoqing Li, Hongfei Lin, Linlin Zong, Bo Xu:
DUTIR938 at SemEval-2024 Task 4: Semi-Supervised Learning and Model Ensemble for Persuasion Techniques Detection in Memes. SemEval@NAACL 2024: 642-648 - [c13]Dailin Li, Chuhan Wang, Xin Zou, Junlong Wang, Peng Chen, Jian Wang, Liang Yang, Hongfei Lin:
CoT-based Data Augmentation Strategy for Persuasion Techniques Detection. SemEval@NAACL 2024: 1315-1321 - [i1]Jingcong Liang, Junlong Wang, Xinyu Zhai, Yungui Zhuang, Yiyang Zheng, Xin Xu, Xiandong Ran, Xiaozheng Dong, Honghui Rong, Yanlun Liu, Hao Chen, Yuhan Wei, Donghai Li, Jiajie Peng, Xuanjing Huang, Chongde Shi, Yansong Feng, Yun Song, Zhongyu Wei:
Overview of the CAIL 2023 Argument Mining Track. CoRR abs/2406.14503 (2024) - 2023
- [j6]Anlei Liu, Xun Ma, Xuchao Jia, Kai Liu, Ming Ji, Jian Feng, Junlong Wang:
Automatic classification method of power user's requirements text based on parallel naive Bayesian algorithm. J. Intell. Fuzzy Syst. 45(3): 4277-4289 (2023) - [c12]Junlong Wang, Dechang Pi, Mingtian Ping, Zhiwei Chen:
A Novel Explainable Rumor Detection Model with Fusing Objective Information. ADMA (2) 2023: 504-517 - [c11]Mingtian Ping, Dechang Pi, Zhiwei Chen, Junlong Wang:
Cross-Domain Bearing Fault Diagnosis Method Using Hierarchical Pseudo Labels. ICONIP (6) 2023: 32-43 - [c10]Zhiwei Chen, Dechang Pi, Junlong Wang, Mingtian Ping:
Novel Method for Radar Echo Target Detection. ICONIP (5) 2023: 586-597 - [c9]Junlong Wang, Yongqi Leng, Xinyu Zhai, Linlin Zong, Hongfei Lin, Bo Xu:
Adversarial Training and Model Ensemble for User Feedback Prediciton in Conversation System. NLPCC (3) 2023: 366-375 - 2022
- [c8]Junlong Wang, Chaoyi Yang, Zhenni Pan, Shigeru Shimamoto:
Optimization on OTFS Modulation Channel Estimation Path Employing CNN-based Self-Adjustment Model. ICC Workshops 2022: 951-956 - [c7]Chaoyi Yang, Junlong Wang, Zhenni Pan, Shigeru Shimamoto:
Delay-Doppler Frequency Domain-Aided Superimposing Pilot OTFS Channel Estimation Based on Deep Learning. VTC Fall 2022: 1-6 - 2021
- [j5]Zhifeng Liu, Junlong Wang, Caixia Zhang, Hongyan Chu, Guozhi Ding, Lu Zhang:
A hybrid genetic-particle swarm algorithm based on multilevel neighbourhood structure for flexible job shop scheduling problem. Comput. Oper. Res. 135: 105431 (2021) - 2020
- [j4]Hongfei Zhao, Weitian Wang, Liping Liu, Junlong Wang, Quanzhang Yan:
Functional Modular Network Identifies the Key Genes of Preoperative Inhalation Anesthesia and Intravenous Anesthesia in Off-Pump Coronary Artery Bypass Grafting. Comput. Math. Methods Medicine 2020: 4574792:1-4574792:12 (2020)
2010 – 2019
- 2018
- [c6]Junlong Wang, Junrui Liang:
Energy Harvesting from Horizontal and Vertical Backpack Movements During Walking. AIM 2018: 798-803 - [c5]Junlong Wang, Wei Jiang, Jinyu Zhan, Jinghuan Yu, Haibo Hu, Liugen Xu:
Persistence improvement for distributed cache with NVM based storage system: work-in-progress. CASES 2018: 2:1-2:3 - 2017
- [j3]Ge Liu, Bo Zhang, Li-Sen Zhang, Dong Xing, Junlong Wang, Yong Fan:
420 GHz subharmonic mixer based on heterogeneous integrated Schottky diode. IEICE Electron. Express 14(12): 20170459 (2017) - 2016
- [j2]Jingyi Wang, Shuling Che, Ying Li, Junlong Wang:
Optimal design of joint network LDPC codes over orthogonal multiple-access relay channels. Int. J. Grid Util. Comput. 7(1): 68-74 (2016) - [j1]Kun Lu, Junlong Wang, Mingchu Li:
An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-Peer Netw. Appl. 9(3): 599-612 (2016) - [c4]Mingchu Li, Junlong Wang, Kun Lu, Cheng Guo, Xing Tan:
A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks. FNC/MobiSPC 2016: 360-365 - [c3]Kun Lu, Junlong Wang, Ling Xie, Qilong Zhen, Mingchu Li:
An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks. FNC/MobiSPC 2016: 366-371 - 2013
- [c2]Jingyi Wang, Shuling Che, Ying Li, Junlong Wang:
Optimal Design of the Joint Network LDPC Codes for Half-Duplex Cooperative Multi-access Relay Channel. INCoS 2013: 622-625 - [c1]Jianquan Yang, Guopu Zhu, Junlong Wang, Yun-Qing Shi:
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration. IWDW 2013: 169-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint