Name
Papers
Collaborators
WEI JIANG
47
129
Citations 
PageRank 
Referers 
220
22.56
577
Referees 
References 
668
256
Search Limit
100668
Title
Citations
PageRank
Year
Initial Access for Millimeter-Wave and Terahertz Communications with Hybrid Beamforming00.342022
Data-Driven Modeling the Nonlinear Backlash of Steerable Endoscope Under a Large Deflection Cannulation in ERCP Surgery.00.342021
Design of a Novel High-Power Density Negative Ion Virus Destructor for Confined Shipboard Space.00.342021
Semi-supervised Attention-Guided VNet for Breast Cancer Detection via Multi-task Learning.00.342021
Mode Selection and Power Allocation for UAV-Assisted Cellular Networks.00.342021
Dynamic Popularity-Aware Contrastive Learning for Recommendation.00.342021
Multi-Agent Resource Allocation for NOMA-Based Broadcasting Vehicular Networks.00.342021
An Asynchronous Approximate Distributed Alternating Direction Method of Multipliers in Digraphs.00.342021
Decision-Based Marginal Diffusion For Salt-And-Pepper Noise Removal In Color Images00.342021
Battery Energy Storage Converter for Shipboard Energy Magazine System.00.342021
Short-term PM2.5 Forecasting with a Hybrid Model Based on Ensemble GRU Neural Network.00.342020
SUDA-Alibaba at MRP 2019 - Graph-Based Models with BERT.00.342019
Oscillation and The Suppression Strategy in Microgrid - A Review.00.342019
Analytical Derivatives for Differentiable Renderer: 3D Pose Estimation by Silhouette Consistency.00.342019
ShopSign: a Diverse Scene Text Dataset of Chinese Shop Signs in Street Views.00.342019
Improve Object Detection by Data Enhancement based on Generative Adversarial Nets.00.342019
A Dual-level Model Predictive Control Scheme for Multi-timescale Dynamical Systems.00.342019
A Seq-to-Seq Transformer Premised Temporal Convolutional Network for Chinese Word Segmentation.00.342019
Dynamic Characteristic Analysis and Stability Control of Microgrid.00.342019
一种云环境下的主机负载预测方法 (Workload Forecasting Method in Cloud).00.342018
AlignedReID: Surpassing Human-Level Performance in Person Re-Identification.110.652017
The offline software framework of the DAMPE experiment.00.342016
Study on Identification of Subjective Sentences in Product Reviews Based on Weekly Supervised Topic Model.00.342014
For User-Driven Software Evolution: Requirements Elicitation Derived from Mining Online Reviews.90.492014
What, where, and when: keyword search with spatio-temporal ranges60.442014
A Simplified Active Shape Model for Speeding-Up Facial Features Detection.00.342013
An Improved PAPR Suppression Algorithm based on Channel Coding in OFDM System.00.342013
A robust radio access technology classification scheme with practical considerations00.342013
Low-Complexity Spectral Precoding for Rectangularly Pulsed OFDM50.572012
Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint90.562012
ARCSM: A Distributed Feedback Control Mechanism for Security-critical Real-time System00.342012
An enhanced random beamforming scheme for signal broadcasting in multi-antenna systems00.342012
Feedback Vertex Sets on Tree Convex Bipartite Graphs.70.562012
Design of Real Time Multimedia Platform and Protocol to the Internet of Things50.452012
Large-Scale Longitudinal Analysis of SOAP-Based and RESTful Web Services190.802012
Suppressing the out-of-band power radiation in multi-carrier systems: A comparative study30.432012
The Application of the Fuzzy Theory in the Design of Intelligent Building Control of Water Tank.40.602011
Ex-MATE: Data Intensive Computing with Large Reduction Objects and Its Application to Graph Mining80.532011
Energy Measurement and Analysis of Security Algorithms for Embedded Systems10.372011
QSynth: A Tool for QoS-aware Automatic Service Composition551.552010
Supporting fault tolerance in a data-intensive computing middleware100.572010
Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks60.612010
Two-phase graph search algorithm for QoS-aware automatic service composition60.462010
An Implementation of Post-Processing Software in Quantum Key Distribution40.732009
Efficiency of Winnow Protocol in Secret Key Reconciliation50.702009
Effective Pruning Algorithm for QoS-Aware Service Composition341.322009
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy131.072007