Runhua Wang

ORCID: 0000-0002-6345-518X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Neural Networks and Applications
  • Advanced Sensor and Control Systems
  • Neural Networks Stability and Synchronization
  • Industrial Technology and Control Systems
  • Advanced Memory and Neural Computing
  • Advanced Algorithms and Applications
  • Distributed Control Multi-Agent Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Auction Theory and Applications
  • Adsorption and biosorption for pollutant removal
  • Blockchain Technology Applications and Security
  • Machine Learning and ELM
  • Stochastic Gradient Optimization Techniques
  • Data Mining Algorithms and Applications
  • Data Management and Algorithms
  • Web Data Mining and Analysis
  • Intellectual Property and Patents
  • Nanocluster Synthesis and Applications
  • Stability and Control of Uncertain Systems
  • Experimental Behavioral Economics Studies
  • Analysis of environmental and stochastic processes
  • World Trade Organization Law
  • International Arbitration and Investment Law
  • Random Matrices and Applications
  • Trade Secret Protection Methods

Sun Yat-sen University
2022-2024

University of Science and Technology Beijing
2023-2024

Central South University
2019-2021

Chongqing University of Science and Technology
2009-2013

Chongqing Public Health Medical Center
2011

Chongqing Medical University
2011

Central University of Finance and Economics
2007

10.1109/icassp49660.2025.10890227 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Word-of-Mouth (WoM) mode, as a new mode of task sensing in crowdsourcing, shows high efficiency building contributor groups. To better tap the potential WoM mobile underlying rationale interactions among contributors needs to be well understood. In this article, we analyze behavior based on Stackelberg game, and find optimal strategies for contributors. We consider two different crowdsourcing tasks announcement methods: 1) one-time parallel 2) multitime sequential ways, which form market...

10.1109/jiot.2020.2989745 article EN IEEE Internet of Things Journal 2020-04-23

Amid the surge of intellectual property (IP) disputes surrounding non-fungible tokens (NFTs), some scholars have advocated for application personal or sales law to regulate NFT minting and transactions, contending that IP laws unduly hinder development market. This Article counters these proposals argues existing system stands as most suitable regulatory framework governing evolving Compared law, can more effectively address challenges such tragedies commons anticommons in communities also...

10.1111/ablj.12237 article EN cc-by-nc-nd American Business Law Journal 2024-02-21

This paper considers the problem of decentralized resource allocation in presence Byzantine attacks. Such attacks occur when an unknown number malicious agents send random or carefully crafted messages to their neighbors, aiming prevent honest from reaching optimal strategy. We characterize these behaviors with classical model, and propose a class Byzantine-resilient algorithms augmented dual-domain defenses. The receive containing (possibly malicious) dual variables neighbors at each...

10.1109/icassp48485.2024.10446020 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

This paper considers the resource allocation problem over a decentralized multi-agent network and at presence of Byzantine agents. Compared with its centralized counterpart, algorithm enjoys better scalability when is large-scale, but more vulnerable some agents are malicious send wrong messages during optimization process. We utilize classical attack model to describe these actions, propose novel Byzantine-resilient algorithm, abbreviated as BREDA. At each iteration BREDA, honest agent...

10.1109/tsp.2022.3209010 article EN publisher-specific-oa IEEE Transactions on Signal Processing 2022-01-01

Mobile crowdsourcing is a promising paradigm for collecting sensing data by leveraging contributions of numerous mobile smart phones. It works efficiently with Word Mouth Mode (WoM), especially tasks time and location constraints, since the task can be spread quickly among contributors in WoM mode. In this paper, we first investigate behaviors contributors, categorize all into four types according to their different behaviors, propose an inviting algorithm recruit cooperators through social...

10.1109/access.2019.2893184 article EN cc-by-nc-nd IEEE Access 2019-01-01

This paper has finished data mining from library management system by K-means algorithm of the cluster analysis, made analysis on various characteristics readers' grades and departments thus gained results. The results show that procurement department shall add books English reading materials, computational linguistics, computer operation, social-romantic novels, etc. so as to satisfy demand student readers. a certain extent can be taken guide rationalize distribution resources increase...

10.1109/coginf.2011.6016175 article EN 2011-08-01

In this paper, a research is made for prediction model library circulation established upon application of BP neural network, by which it possible to predict books from library. And the subject verification through simulation combination actual statistical data in terms circulation, with good effect. It great guiding and referential significance make quantitative qualitative analysis improve management.

10.1109/icci-cc.2012.6311183 article EN 2012-08-01

10.1109/tsipn.2024.3485508 article EN IEEE Transactions on Signal and Information Processing over Networks 2024-01-01

The patent regime needs to create a new type of patents, which protect AI-enabled inventions and are distinguished from utility patents. This proposal calls it an “AI patent.” Regarding AI systems not assigned the full inventorship as human inventors. What they have is deputy inventorship, quasi-inventorship. in patents narrowly established by joint inventors, must be natural persons collaborate with inventor—an system. In other words, independently developed do qualify for protection...

10.2139/ssrn.4456823 article EN SSRN Electronic Journal 2023-01-01

This paper considers the resource allocation problem in a decentralized multi-agent network at presence of Byzantine agents. Compared with its centralized counterpart, algorithm enjoys better scalability when is large-scale, but more vulnerable some agents are malicious and send wrong messages during optimization process. We use attack model to describe these actions, propose novel Byzantine-resilient algorithm, abbreviated as BREDA. At each iteration BREDA, honest agent receives from...

10.1109/icassp43922.2022.9746633 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

In this paper, by employing the Lyapunov-Krasovskii functional method, we investigate global robust stability analysis problem for uncertain stochastic neural networks of neutral-type with time-varying delays. A new criterion is proposed in terms linear matrix inequality (LMI). An example given to show effectiveness obtained results using LMI control toolbox MATLAB.

10.1109/iceice.2011.5777859 article EN International Conference on Electric Information and Control Engineering 2011-04-01

in this paper, the mass oriented HTML data refers to those large enough for data, that can no longer use traditional methods of treatment.In past, has been Web search engine creators have face problem be first bear brunt.Today, various social networks, mobile applications and sensors scientific fields are created daily with PB data.In order deal massive processing challenges HTML, Google MapReduce.Google Yahoo Hadoop hatching out an intact tools ecological system.

10.2991/iccsee.2013.336 article EN cc-by-nc Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) 2013-01-01

This paper deals with the robust stability for uncertain bidirectional associative memory (BAM) neural networks of neutral-type time-varying delays. The parameter uncertainties are assumed to be norm bounded, discrete delays and neutral combined method, which is based on Lyapunov-Krasovskii functional (LKF) some inequality techniques, used investigate this problem. Then, by constructing a new LKF, using Newton-Leibniz formula introducing free weighting matrices, sufficient conditions...

10.1109/coginf.2011.6016135 article EN 2011-08-01

the wireless sensor network and its characteristics of study concluded, that (WSN) ad hoc network.And key problems need to be solved.On several today's popular WSN hierarchical routing protocols are analyzed summarized.On whether data centric, support fusion, based on node localization, quality service (QoS), scalability, robustness safety other aspects comparison, points out advantages disadvantages.Finally it is pointed current protocol committed meet basic performance improvement QoS.

10.2991/iccsee.2013.337 article EN cc-by-nc Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) 2013-01-01

In this paper, the delay-dependent robust stability is investigated for uncertain neutral-type delayed neural networks with discrete interval time-varying delays. The parameter uncertainties are assumed to be norm bounded. Based on Lyapunov-Krasovskii functional, Leibniz-Newton formula and linear matrix inequality (LMI) technique, some conditions proposed by introducing free-weighting matrices. A numerical example presented illustrate efficiency of result.

10.1109/icci-cc.2013.6622267 article EN 2013-07-01

This paper deals with the problem of robust stability analysis for uncertain stochastic neural networks time varying delay. Based on Lyapunov-Krasovskii functional theory and free-weighting matrices method, delay dependent criteria are proposed in terms linear matrix inequality (LMI). Two examples given to show less conservativeness obtained conditions.

10.1109/iceice.2011.5777306 article EN International Conference on Electric Information and Control Engineering 2011-04-01

10.3724/sp.j.1008.2013.00980 article EN Academic Journal of Second Military Medical University 2013-11-28

This thesis mainly expounds the design ideas and realization methods of medical statistics question database management system.Specifically speaking,the function modules,data structure business processes system are designed based on analysis questions,test papers needs functions.We choose Visual Basic 6.0 to develop interface,establish with Access 2003,and make use Word 2003 output documents.This can achieve separation teaching testing effectively which examinations more normal...

10.3760/cma.j.issn.2095-1485.2011.10.023 article EN Zhonghua yixue jiaoyu tansuo zazhi 2011-10-20
Coming Soon ...