default search action
Shiwen Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Yu Li, Hongxi Wei, Shiwen Sun:
LABT: A Sequence-to-Sequence Model for Mongolian Handwritten Text Recognition with Local Aggregation BiLSTM and Transformer. ICDAR (2) 2024: 352-363 - 2023
- [j18]Wenkai Xu, Li Wang, Shiwen Sun, Chengyi Xia, Zengqiang Chen:
A novel policy iteration algorithm for solving the optimal consensus control problem of a discrete-time multiagent system with unknown dynamics. Sci. China Inf. Sci. 66(8) (2023) - [j17]Shiwen Sun, Tongjiang Yan, Yuhua Sun, Tao Wang, Xueting Wang:
Non-binary quantum synchronizable codes based on cyclic codes over rmFq. Quantum Inf. Process. 22(1): 72 (2023) - [j16]Jiaxing Chen, Shiwen Sun, Chengyi Xia, Dinghua Shi, Guanrong Chen:
Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs. IEEE Trans. Netw. Sci. Eng. 10(6): 3767-3778 (2023) - [c7]Yanli Wang, Li Wang, Shiwen Sun:
A Fishing Detector with Attentional Mechanisms. CAIBDA 2023: 215-220 - [c6]Shiwen Sun, Hongxi Wei, Yiming Wang:
A Hybrid Approach Using Convolution and Transformer for Mongolian Ancient Documents Recognition. ICONIP (13) 2023: 165-176 - 2022
- [c5]Yiming Wang, Heng Wang, Shiwen Sun, Hongxi Wei:
An Approach Based on Transformer and Deformable Convolution for Realistic Handwriting Samples Generation. ICPR 2022: 1457-1463 - [c4]Shiwen Sun, Hongxi Wei:
A Mongolian Handwritten Word Images Generation Approach Based on Generative Adversarial Networks. IJCNN 2022: 1-8 - [c3]Xueting Wang, Tongjiang Yan, Tao Wang, Shiwen Sun:
Quantum Synchronizable Codes from Generalized Cyclotomy. IWSDA 2022: 1-5 - 2020
- [j15]Shiwen Sun, Tongjiang Yan, Yuhua Sun, Ming Yan:
Computing the 2-Adic Complexity of Two Classes Generalized Cyclotomic Sequences. IEEE Access 8: 140478-140485 (2020) - [j14]Tongjiang Yan, Ming Yan, Yuhua Sun, Shiwen Sun:
The 2-Adic Complexity of Ding-Helleseth Generalized Cyclotomic Sequences of Order 2 and Period pq. IEEE Access 8: 140682-140687 (2020) - [j13]Shiwen Sun, Xiaoxiao Liu, Li Wang, Chengyi Xia:
New Link Attack Strategies of Complex Networks Based on k-Core Decomposition. IEEE Trans. Circuits Syst. 67-II(12): 3157-3161 (2020)
2010 – 2019
- 2019
- [j12]Yuetian Dong, Shiwen Sun, Chengyi Xia, Matjaz Perc:
Second-Order Reputation Promotes Cooperation in the Spatial Prisoner's Dilemma Game. IEEE Access 7: 82532-82540 (2019) - [j11]Yongping Luo, Li Wang, Shiwen Sun, Chengyi Xia:
Community Detection Based on Local Information and Dynamic Expansion. IEEE Access 7: 142773-142786 (2019) - [j10]Zhishuang Wang, Quantong Guo, Shiwen Sun, Chengyi Xia:
The impact of awareness diffusion on SIR-like epidemics in multiplex networks. Appl. Math. Comput. 349: 134-147 (2019) - [j9]Xiaopeng Li, Shiwen Sun, Chengyi Xia:
Reputation-based adaptive adjustment of link weight among individuals promotes the cooperation in spatial social dilemmas. Appl. Math. Comput. 361: 810-820 (2019) - [c2]Qian Shao, Shiwen Sun, Chengyi Xia:
A Novel Propagation Model Coupling the Offline Network with Online Social Network Framework. ISCAS 2019: 1-5 - 2018
- [j8]Chao Li, Li Wang, Shiwen Sun, Chengyi Xia:
Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 320: 512-523 (2018) - [j7]Jie Li, Juan Wang, Shiwen Sun, Chengyi Xia:
Cascading crashes induced by the individual heterogeneity in complex networks. Appl. Math. Comput. 323: 182-192 (2018) - 2017
- [j6]Chengjiang Wang, Li Wang, Juan Wang, Shiwen Sun, Chengyi Xia:
Inferring the reputation enhances the cooperation in the public goods game on interdependent lattices. Appl. Math. Comput. 293: 18-29 (2017) - [j5]Junping Qin, Shiwen Sun, Qingxu Deng, Limin Liu, Yonghong Tian:
Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks. Sensors 17(6): 1275 (2017) - [c1]Yafang Wu, Shiwen Sun, Li Wang, Chengyi Xia:
Attack vulnerability of interdependent local-world networks: The effect of degree heterogeneity. IECON 2017: 8763-8767 - 2015
- [j4]Mei-huan Chen, Li Wang, Juan Wang, Shiwen Sun, Chengyi Xia:
Impact of individual response strategy on the spatial public goods game within mobile agents. Appl. Math. Comput. 251: 192-202 (2015) - [j3]Shiwen Sun, Ruiqi Li, Li Wang, Chengyi Xia:
Reduced synchronizability of dynamical scale-free networks with onion-like topologies. Appl. Math. Comput. 252: 249-256 (2015)
2000 – 2009
- 2009
- [j2]Chengyi Xia, Shiwen Sun, Feng Rao, Junqing Sun, Jinsong Wang, Zengqiang Chen:
SIS model of epidemic spreading on dynamical networks with community. Frontiers Comput. Sci. China 3(3): 361-365 (2009) - [j1]Shiwen Sun, Chengyi Xia, Zhenhai Chen, Junqing Sun, Zengqiang Chen:
Generalized collaboration networks in software systems: a case study of Linux kernels. Frontiers Comput. Sci. China 3(3): 421-426 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint