default search action
Wu Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Junbi Xiao, Jiaqi Zheng, Wu Wen, Mohsen Guizani, Peiying Zhang, Lizhuang Tan:
Multi-objective optimization of SFC deployment using service aggregation and computing offload. Comput. Commun. 224: 60-71 (2024) - [j21]Hang Zhou, Yuxin Li, Wu Wen, Hao Yang, Yayu Ma, Min Chen:
Accurately 3D neuron localization using 2D conv-LSTM super-resolution segmentation network. IET Image Process. 18(2): 535-547 (2024) - [j20]Bingxian Lu, Mengya Wang, Wu Wen, Yang Zhang:
Improving FTM Ranging Accuracy Based on DNN for UAV Localization. IEEE Internet Things J. 11(12): 21287-21298 (2024) - [j19]Yuhuai Peng, Chenlu Wang, Wu Wen, Songye Wen, Xuanrui Xiong:
An Online Scheduling Framework for Multiple TBD Flows in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 25(1): 1054-1068 (2024) - [i1]Di Wu, Jian Liu, Zhengwei Hou, Wu Wen, Kui Ren:
ECHO: Efficient Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies. CoRR abs/2403.15191 (2024) - 2023
- [j18]Wu Wen, Umit Demirbaga, Amritpal Singh, Anish Jindal, Ranbir Singh Batth, Peiying Zhang, Gagangeet Singh Aujla:
Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City. IEEE Internet Things J. 10(21): 18571-18578 (2023) - [j17]Wu Wen, Dongliang Xu, Yang Xia:
A novel traffic optimization method using GRU based deep neural network for the IoV system. PeerJ Comput. Sci. 9: e1411 (2023) - [j16]Chao Qiu, Gagangeet Singh Aujla, Jing Jiang, Wu Wen, Peiying Zhang:
Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT Using Proof of Learning Consensus Protocol. IEEE Trans. Ind. Informatics 19(1): 900-909 (2023) - [c19]Huahai Lin, Yong Wen, Ping Jiang, Wu Wen, Xianye Liang:
Knowledge-Aware Two-Stream Decoding for Outline-Conditioned Chinese Story Generation. KSEM (3) 2023: 268-281 - 2022
- [j15]Peiying Zhang, Peng Gan, Lunjie Chang, Wu Wen, Munuswamy Selvi, Godfrey Kibalya:
DPRL: Task Offloading Strategy Based on Differential Privacy and Reinforcement Learning in Edge Computing. IEEE Access 10: 54002-54011 (2022) - [j14]Youxiang Duan, Ning Chen, Peiying Zhang, Neeraj Kumar, Lunjie Chang, Wu Wen:
MS2GAH: Multi-label semantic supervised graph attention hashing for robust cross-modal retrieval. Pattern Recognit. 128: 108676 (2022) - [j13]Xi Wang, Bin Chen, Xuecao Li, Yuxin Zhang, Xianyao Ling, Jie Wang, Weimin Li, Wu Wen, Peng Gong:
Grid-Based Essential Urban Land Use Classification: A Data and Model Driven Mapping Framework in Xiamen City. Remote. Sens. 14(23): 6143 (2022)
2010 – 2019
- 2019
- [c18]Wu Wen, Jiahui Sun, Ya Li, Peng Gu, Jianfeng Xu:
Design and Implementation of Software Test Laboratory Based on Cloud Platform. QRS Companion 2019: 138-144 - 2018
- [j12]Wu Wen, Xianbin Wen, Liming Yuan, Haixia Xu:
Range-free localization using expected hop progress in anisotropic wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 299 (2018) - 2017
- [j11]Wu Wen, Lingxuan Zuo:
基于色彩特征的无参考彩色图像质量评价 (Blind Color Image Quality Assessment Base on Color Characteristics). 计算机科学 44(Z6): 151-156 (2017) - 2016
- [j10]Runhai Jiao, Shaolong Liu, Wu Wen, Biying Lin:
Incremental kernel fuzzy c-means with optimizing cluster center initialization and delivery. Kybernetes 45(8): 1273-1291 (2016) - 2014
- [j9]Jian-gang Yao, Wu Wen, Zheng-wei Guo, Shen-jie Yang:
An Assessment Method of Information Transfer Capacity for Smart Grid. J. Comput. 9(2): 368-372 (2014) - 2013
- [c17]Yang Jiao, Weimin Li, Dianwei Zhang, Wu Wen:
A 70 dBΩ 2.3 GHz low noise transimpedance amplifier. ECCTD 2013: 1-4 - [c16]Yang Jiao, Weimin Li, Dianwei Zhang, Wu Wen:
A 70 dBohm 2.3 GHz low noise transimpedance amplifier. ICCE-Berlin 2013: 322-325 - [c15]Zhong Zhang, Weimin Li, Wu Wen, Wei Wu, Yongfeng Li:
A configurable multi-band GNSS receiver for Compass/GPS/Galileo applications. ISCAS 2013: 161-164 - 2012
- [j8]Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:
An Immune-inspired Adaptive Automated Intrusion Response System Model. Int. J. Comput. Intell. Syst. 5(5): 808-815 (2012) - 2011
- [j7]Chih-Hung Jen, Kuo-Ping Lin, Wu Wen, Chang-Chien Chou:
Using LDA with on-line experiment methods for coping with changes in MIMO dynamic model. Expert Syst. Appl. 38(1): 983-989 (2011) - 2010
- [c14]Lepeng Song, Siyuan Xing, Xiuran Peng, Wu Wen:
Variable structure fuzzy-PI control for strategy of maximal wind energy capture and conversion of doubly fed induction generators. BIC-TA 2010: 26-29 - [c13]Shasha Wang, Weina Guo, Wu Wen, Ruihan Chen, Ting Li, Fang Fang:
Research on Belt Conveyor Monitoring and Control System. ICICA (1) 2010: 334-339
2000 – 2009
- 2008
- [j6]Wu Wen, Y. H. Chen, I. C. Chen:
A knowledge-based decision support system for measuring enterprise performance. Knowl. Based Syst. 21(2): 148-163 (2008) - [j5]Wu Wen, Y. H. Chen, H. H. Pao:
A mobile knowledge management decision support system for automatically conducting an electronic business. Knowl. Based Syst. 21(7): 540-550 (2008) - 2006
- [c12]Wei-Kang Wang, Wu Wen, Wen-Bin Chang, Hao-Chen Huang:
A Knowledge-based Decision Support System for Government Vendor Selection and Bidding. JCIS 2006 - 2005
- [j4]Wu Wen, Wei-Kang Wang, C. H. Wang:
A knowledge-based intelligent decision support system for national defense budget planning. Expert Syst. Appl. 28(1): 55-66 (2005) - [j3]Wu Wen, Wei-Kang Wang, Tzu-Hua Wang:
A hybrid knowledge-based decision support system for enterprise mergers and acquisitions. Expert Syst. Appl. 28(3): 569-582 (2005) - 2001
- [j2]Wu Wen, Fumio Mizoguchi:
Web Security: Authentication Protocols and Their Analysis. New Gener. Comput. 19(3): 283-299 (2001) - [c11]Wu Wen, Germano Caronni, Yahya Y. Al-Salqan:
Summary Report on Enterprise Security Workshop. WETICE 2001: 129-131 - 2000
- [j1]Wu Wen, Fumio Mizoguchi:
An Authorization-based Trust Model for Multiagent Systems. Appl. Artif. Intell. 14(9): 909-925 (2000) - [c10]Wu Wen, Takamichi Saito, Fumio Mizoguchi:
Security of Public Key Certificate Based Authentication Protocols. Public Key Cryptography 2000: 196-209 - [c9]Wu Wen, Yahya Y. Al-Salqan:
Summary Report on Enterprise Security Workshop. WETICE 2000: 139-140 - [c8]Wu Wen:
A Delayed Commitment Scheme to Enhance Public Key Certificate Based Protocols. WETICE 2000: 181-182
1990 – 1999
- 1999
- [c7]Wu Wen, Fumio Mizoguchi:
Analysis and Verification of Multi-Agent Interaction Protocols. Agents 1999: 372-373 - [c6]Wu Wen, Fumio Mizoguchi:
Analysis and Verification of Multi-Agent Interaction Protocols. APSEC 1999: 252-259 - [c5]Wu Wen, Frank Schneider:
Software Fault Injection in Concurrent Systems. PDPTA 1999: 2378-2383 - [c4]Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi:
Final Summary Report on Enterprise Security. WETICE 1999: 134 - [c3]Takamichi Saito, Wu Wen, Fumio Mizoguchi:
Incremental Analysis and Verification of Authentication Protocols. WETICE 1999: 192-193 - 1992
- [c2]Wu Wen, Hugh F. Durrant-Whyte:
Model-based multi-sensor data fusion. ICRA 1992: 1720-1726 - 1991
- [c1]Wu Wen, Hugh F. Durrant-Whyte:
Model based active object localisation using multiple sensors. IROS 1991: 1448-1452
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint