default search action
Sujuan Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Zhuomin Li, Mingkun Liu, Sujuan Wang, Liqin Qu, Lei Guan:
Sea Surface Skin Temperature Retrieval from FY-3C/VIRR. Remote. Sens. 14(6): 1451 (2022) - [c8]Zilan Chen, Sujuan Wang, Swagata Das, Yuichi Kurita, Takashi Goto, Chun Zhai, Lei Xu, Kai Kunze:
Towards Applying Pneumatic Gel Muscles to Augment Plantar Flexor Muscle Stretching for Children with Cerebral Palsy. AHs 2022: 337-340 - 2021
- [j9]Ninghui Li, Sujuan Wang, Lei Guan, Mingkun Liu:
Assessment of Global FY-3C/VIRR Sea Surface Temperature. Remote. Sens. 13(16): 3249 (2021) - [j8]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [c7]Feiya Li, Chunyun Fu, Sujuan Wang, Yun Zhu, Zhankun Li, Binbin Feng:
Lidar-based vehicle detection for dynamic SLAM applications. ICCAIS 2021: 674-678 - 2020
- [i3]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020)
2010 – 2019
- 2019
- [j7]Naiping Li, Jinghan Zhang, Sujuan Wang, Yongfang Jiang, Jing Ma, Ju Ma, Long-jun Dong, Guozhong Gong:
Machine Learning Assessment for Severity of Liver Fibrosis for Chronic HBV Based on Physical Layer With Serum Markers. IEEE Access 7: 124351-124365 (2019) - [j6]Xiaohong Yu, Sujuan Wang, Xindong Zhang:
Ordering Decision and Coordination of a Dual-Channel Supply Chain with Fairness Concerns Under an Online-to-Offline Model. Asia Pac. J. Oper. Res. 36(2): 1940004:1-1940004:26 (2019) - [c6]Yiyang Cai, Chenghua Li, Sujuan Wang, Jian Cheng:
DeLTR: A Deep Learning Based Approach to Traffic Light Recognition. ICIG (3) 2019: 604-615 - 2018
- [c5]Pengfei Zhu, Longyin Wen, Dawei Du, Xiao Bian, Haibin Ling, Qinghua Hu, Qinqin Nie, Hao Cheng, Chenfeng Liu, Xiaoyu Liu, Wenya Ma, Haotian Wu, Lianjie Wang, Arne Schumann, Chase Brown, Qian Chen, Chengzheng Li, Dongdong Li, Emmanouil Michail, Fan Zhang, Feng Ni, Feng Zhu, Guanghui Wang, Haipeng Zhang, Han Deng, Hao Liu, Haoran Wang, Heqian Qiu, Honggang Qi, Honghui Shi, Hongliang Li, Hongyu Xu, Hu Lin, Ioannis Kompatsiaris, Jian Cheng, Jianqiang Wang, Jianxiu Yang, Jingkai Zhou, Juanping Zhao, K. J. Joseph, Kaiwen Duan, Karthik Suresh, Bo Ke, Ke Wang, Konstantinos Avgerinakis, Lars Wilko Sommer, Lei Zhang, Li Yang, Lin Cheng, Lin Ma, Liyu Lu, Lu Ding, Minyu Huang, Naveen Kumar Vedurupaka, Nehal Mamgain, Nitin Bansal, Oliver Acatay, Panagiotis Giannakeris, Qian Wang, Qijie Zhao, Qingming Huang, Qiong Liu, Qishang Cheng, Qiuchen Sun, Robert Laganière, Sheng Jiang, Shengjin Wang, Shubo Wei, Siwei Wang, Stefanos Vrochidis, Sujuan Wang, Tiaojio Lee, Usman Sajid, Vineeth N. Balasubramanian, Wei Li, Wei Zhang, Weikun Wu, Wenchi Ma, Wenrui He, Wenzhe Yang, Xiaoyu Chen, Xin Sun, Xinbin Luo, Xintao Lian, Xiufang Li, Yangliu Kuai, Yali Li, Yi Luo, Yifan Zhang, Yiling Liu, Ying Li, Yong Wang, Yongtao Wang, Yuanwei Wu, Yue Fan, Yunchao Wei, Yuqin Zhang, Zexin Wang, Zhangyang Wang, Zhaoyue Xia, Zhen Cui, Zhenwei He, Zhipeng Deng, Zhiyao Guo, Zichen Song:
VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results. ECCV Workshops (5) 2018: 437-468 - [c4]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. NDSS 2018 - [d1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE DataPort, 2018 - [i2]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs/1801.01681 (2018) - [i1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs/1807.06756 (2018) - 2017
- [j5]Sujuan Wang, Qiying Hu, Weiqi Liu:
Price and quality-based competition and channel structure with consumer loyalty. Eur. J. Oper. Res. 262(2): 563-574 (2017) - [j4]Sujuan Wang, Xin Chen, Sandy To, Xindu Chen, Qiang Liu, Jiangwen Liu:
Modelling and prediction of the effect of cutting strategy on surface generation in ultra-precision raster milling. Int. J. Comput. Integr. Manuf. 30(9): 895-909 (2017) - [j3]Yubao Sun, Sujuan Wang, Qingshan Liu, Renlong Hang, Guangcan Liu:
Hypergraph Embedding for Spatial-Spectral Joint Feature Extraction in Hyperspectral Images. Remote. Sens. 9(5): 506 (2017) - [c3]Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong:
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. DIMVA 2017: 325-344 - 2015
- [j2]Yannan Jin, Sujuan Wang, Qiying Hu:
Contract type and decision right of sales promotion in supply chain management with a capital constrained retailer. Eur. J. Oper. Res. 240(2): 415-424 (2015) - 2014
- [j1]Sujuan Wang, Sandy To, Xin Chen, Hao Wang, Hongjian Xia:
A study of the fabrication of v-groove structure in ultra-precision milling. Int. J. Comput. Integr. Manuf. 27(11): 986-996 (2014)
2000 – 2009
- 2008
- [c2]Tingna Shi, Sujuan Wang, Hongwei Fang, Zhengwei Chen:
Fuzzy Immune PI Control of Networked Control System Based on ADW Time-Delay Prediction. FSKD (3) 2008: 76-80 - [c1]Tingna Shi, Zhengwei Chen, Changliang Xia, Hongwei Fang, Sujuan Wang:
EDF Scheduling for Tasks with Uncertain Execution Times in Networked Control System. ICNC (5) 2008: 207-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint