default search action
Search dblp for Publications
export results for "Kehe Wu"
@inproceedings{DBLP:conf/ijcnn/DuanLWWYR24, author = {Feiyu Duan and Chen Li and Keheng Wang and Si Wu and Chuantao Yin and Wenge Rong}, title = {Generative Spoken Language Modeling with Quantized Feature Enhancement}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2024, Yokohama, Japan, June 30 - July 5, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/IJCNN60899.2024.10651390}, doi = {10.1109/IJCNN60899.2024.10651390}, timestamp = {Mon, 30 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/DuanLWWYR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuLZ21, author = {Kehe Wu and Jiawei Li and Bo Zhang}, title = {Abnormal Detection of Wireless Power Terminals in Untrusted Environment Based on Double Hidden Markov Model}, journal = {{IEEE} Access}, volume = {9}, pages = {18682--18691}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3040856}, doi = {10.1109/ACCESS.2020.3040856}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/CuiLQLW21, author = {Wenchao Cui and Qiong Lu and Asif Moin Qureshi and Wei Li and Kehe Wu}, title = {An adaptive LeNet-5 model for anomaly detection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {30}, number = {1}, pages = {19--29}, year = {2021}, url = {https://doi.org/10.1080/19393555.2020.1797248}, doi = {10.1080/19393555.2020.1797248}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/CuiLQLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuLZY020, author = {Kehe Wu and Jiawei Li and Bo Zhang and Zongchao Yu and Xuan Liu}, title = {Preventive Dispatch Strategy Against {FDIA} Induced Overloads in Power Systems With High Wind Penetration}, journal = {{IEEE} Access}, volume = {8}, pages = {210452--210461}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3038527}, doi = {10.1109/ACCESS.2020.3038527}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuLZY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-10465, author = {Kehe Wu and Zuge Chen and Xiaoliang Zhang and Wei Li}, title = {Improvement of Classification in One-Stage Detector}, journal = {CoRR}, volume = {abs/2011.10465}, year = {2020}, url = {https://arxiv.org/abs/2011.10465}, eprinttype = {arXiv}, eprint = {2011.10465}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-10465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07630, author = {Kehe Wu and Zuge Chen and Qi Ma and Xiaoliang Zhang and Wei Li}, title = {Decoupled Self Attention for Accurate One Stage Object Detection}, journal = {CoRR}, volume = {abs/2012.07630}, year = {2020}, url = {https://arxiv.org/abs/2012.07630}, eprinttype = {arXiv}, eprint = {2012.07630}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenWLWL19, author = {Zuge Chen and Kehe Wu and Yuanbo Li and Minjian Wang and Wei Li}, title = {{SSD-MSN:} An Improved Multi-Scale Object Detection Network Based on {SSD}}, journal = {{IEEE} Access}, volume = {7}, pages = {80622--80632}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2923016}, doi = {10.1109/ACCESS.2019.2923016}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenWLWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/XueWZ19, author = {Jianyong Xue and Kehe Wu and Yan Zhou}, title = {A risk analysis and prediction model of electric power {GIS} based on deep learning}, journal = {Int. J. Comput. Sci. Eng.}, volume = {18}, number = {1}, pages = {39--43}, year = {2019}, url = {https://doi.org/10.1504/IJCSE.2019.096983}, doi = {10.1504/IJCSE.2019.096983}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/XueWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiLWCSC18, author = {Wei Li and Rui Li and Kehe Wu and Rui Cheng and Linping Su and Wenchao Cui}, title = {Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications}, journal = {{IEEE} Access}, volume = {6}, pages = {71194--71207}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875681}, doi = {10.1109/ACCESS.2018.2875681}, timestamp = {Tue, 15 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiLWCSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuCL18, author = {Kehe Wu and Zuge Chen and Wei Li}, title = {A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {50850--50859}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2868993}, doi = {10.1109/ACCESS.2018.2868993}, timestamp = {Tue, 15 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicc/WuZLW17, author = {Kehe Wu and Yayun Zhu and Quan Li and Ziwei Wu}, title = {A distributed real-time data prediction framework for large-scale time-series data using stream processing}, journal = {Int. J. Intell. Comput. Cybern.}, volume = {10}, number = {2}, pages = {145--165}, year = {2017}, url = {https://doi.org/10.1108/IJICC-09-2016-0033}, doi = {10.1108/IJICC-09-2016-0033}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicc/WuZLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/WuCL15, author = {Kehe Wu and Long Chen and Yi Li}, title = {A Trusted-based Cloud Computing Virtual Storage System and Key Technologies}, journal = {Int. J. Comput. Commun. Control}, volume = {10}, number = {4}, pages = {579--592}, year = {2015}, url = {https://doi.org/10.15837/ijccc.2015.4.1992}, doi = {10.15837/IJCCC.2015.4.1992}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/WuCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ChenWL14, author = {Long Chen and Kehe Wu and Yi Li}, title = {A Load Balancing Algorithm Based on Maximum Entropy Methods in Homogeneous Clusters}, journal = {Entropy}, volume = {16}, number = {11}, pages = {5677--5697}, year = {2014}, url = {https://doi.org/10.3390/e16115677}, doi = {10.3390/E16115677}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ChenWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/WangGCWW13, author = {Zhuxiao Wang and Jing Guo and Fei Chen and Kehe Wu and Peng Wang}, title = {An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings}, journal = {J. Softw.}, volume = {8}, number = {1}, pages = {243--250}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.1.243-250}, doi = {10.4304/JSW.8.1.243-250}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/WangGCWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icica/WangGLWGT12, author = {Zhuxiao Wang and Zhitao Guan and Wei Li and Kehe Wu and Jing Guo and Guanhua Tian}, editor = {Chunfeng Liu and Leizhen Wang and Aimin Yang}, title = {A Tableau-Based Reasoning Algorithm for Distributed Dynamic Description Logics}, booktitle = {Information Computing and Applications - Third International Conference, {ICICA} 2012, Chengde, China, September 14-16, 2012. Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {307}, pages = {192--199}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34038-3\_27}, doi = {10.1007/978-3-642-34038-3\_27}, timestamp = {Tue, 15 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icica/WangGLWGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/WangPGZWXW12, author = {Zhuxiao Wang and Hui Peng and Jing Guo and Ying Zhang and Kehe Wu and Huan Xu and Xiaofeng Wang}, editor = {Zhongzhi Shi and David B. Leake and Sunil Vadera}, title = {An Architecture Description Language Based on Dynamic Description Logics}, booktitle = {Intelligent Information Processing {VI} - 7th {IFIP} {TC} 12 International Conference, {IIP} 2012, Guilin, China, October 12-15, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {385}, pages = {157--166}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32891-6\_21}, doi = {10.1007/978-3-642-32891-6\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/WangPGZWXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/WangWX11, author = {Xiaohui Wang and Kehe Wu and Yuhan Xu}, editor = {Tzung{-}Pei Hong and Yasuo Kudo and Mineichi Kudo and Tsau Young Lin and Been{-}Chian Chien and Shyue{-}Liang Wang and Masahiro Inuiguchi and Guilong Liu}, title = {The data model and structure of power {GIS}}, booktitle = {2011 {IEEE} International Conference on Granular Computing, GrC-2011, Kaohsiung, Taiwan, November 8-10, 2011}, pages = {734--738}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/GRC.2011.6122689}, doi = {10.1109/GRC.2011.6122689}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/grc/WangWX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/WuTD11, author = {Kehe Wu and Xiao Tu and Cheng Duan}, editor = {Zhiguo Gong and Xiangfeng Luo and Junjie Chen and Jingsheng Lei and Fu Lee Wang}, title = {Research and Implementation of Entropy-Based Model to Evaluation of the Investment Efficiency of Grid Enterprise}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6988}, pages = {44--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23982-3\_6}, doi = {10.1007/978-3-642-23982-3\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/WuTD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WuZC10, author = {Kehe Wu and Tong Zhang and Fei Chen}, title = {Research on Active Controllable Defense Model Based on Zero-PDR Model}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {572--575}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.140}, doi = {10.1109/IITSI.2010.140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WuZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sucoms/0010FZWT10, author = {Wei Li and Zhiwei Feng and Jing Zhou and Kehe Wu and Jing Teng}, editor = {Tai{-}Hoon Kim and Adrian Stoica and Ruay{-}Shiung Chang}, title = {Dynamic Increasing the Capacity of Transmission Line Based on the Kylin Operating System}, booktitle = {Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {78}, pages = {10--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16444-6\_2}, doi = {10.1007/978-3-642-16444-6\_2}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sucoms/0010FZWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/GuanHWY10, author = {Zhitao Guan and Jietao He and Kehe Wu and Shuai Yuan}, title = {Research on a Behavior-based active controllable defense model and its application}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {687--691}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541867}, doi = {10.1109/WCINS.2010.5541867}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/GuanHWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccsecis/WuHLT09, author = {Kehe Wu and Xia He and Tingshun Li and Hongyu Tao}, title = {To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene}, journal = {Comput. Inf. Sci.}, volume = {2}, number = {1}, pages = {137--141}, year = {2009}, url = {https://doi.org/10.5539/cis.v2n1p137}, doi = {10.5539/CIS.V2N1P137}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccsecis/WuHLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JizhenKTG09, author = {Jizhen Liu and Kehe Wu and Tong Zhang and Gang Ma}, title = {The Design and Implementation of Security Defense Technology Based on Mandatory Running Control}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {770--773}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.236}, doi = {10.1109/IAS.2009.236}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/JizhenKTG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/WuZM09, author = {Kehe Wu and Tong Zhang and Gang Ma}, editor = {Hamid R. Arabnia and Hassan Reza}, title = {The Design and Implementation of Mandatory Running Control}, booktitle = {Proceedings of the 2009 International Conference on Software Engineering Research {\&} Practice, {SERP} 2009, July 13-16, 2009, Las Vegas, Nevada, USA, 2 Volumes}, pages = {279--282}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/serp/WuZM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/MaJLW07, author = {Yinglong Ma and Beihong Jin and Yuancheng Li and Kehe Wu}, editor = {Zhi{-}Hua Zhou and Hang Li and Qiang Yang}, title = {A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments}, booktitle = {Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, {PAKDD} 2007, Nanjing, China, May 22-25, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4426}, pages = {183--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71701-0\_20}, doi = {10.1007/978-3-540-71701-0\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/MaJLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsfdgrc/LiWMZ07, author = {Yuancheng Li and Kehe Wu and Yinglong Ma and Shipeng Zhang}, editor = {Aijun An and Jerzy Stefanowski and Sheela Ramanna and Cory J. Butz and Witold Pedrycz and Guoyin Wang}, title = {Image Digital Watermarking Technique Based on Kernel Independent Component Analysis}, booktitle = {Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, 11th International Conference, RSFDGrC 2007, Toronto, Canada, May 14-16, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4482}, pages = {467--474}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72530-5\_56}, doi = {10.1007/978-3-540-72530-5\_56}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rsfdgrc/LiWMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/MaWZL06, author = {Yinglong Ma and Kehe Wu and Yi Zheng and Wei Li}, title = {Multi-agent Coordination Based on Semantic Approximation}, booktitle = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006}, pages = {510--513}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WI-IATW.2006.93}, doi = {10.1109/WI-IATW.2006.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/MaWZL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/MaWJL06, author = {Yinglong Ma and Kehe Wu and Beihong Jin and Wei Li}, editor = {Zhong{-}Zhi Shi and Ramakoti Sadananda}, title = {A Combination Framework for Semantic Based Query Across Multiple Ontologies}, booktitle = {Agent Computing and Multi-Agent Systems, 9th Pacific Rim International Workshop on Multi-Agents, {PRIMA} 2006, Guilin, China, August 7-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4088}, pages = {463--470}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802372\_44}, doi = {10.1007/11802372\_44}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prima/MaWJL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rskt/MaWJL06, author = {Yinglong Ma and Kehe Wu and Beihong Jin and Shaohua Liu}, editor = {Guoyin Wang and James F. Peters and Andrzej Skowron and Yiyu Yao}, title = {Approximate Semantic Query Based on Multi-agent Systems}, booktitle = {Rough Sets and Knowledge Technology, First International Conference, {RSKT} 2006, Chongqing, China, July 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4062}, pages = {735--741}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11795131\_107}, doi = {10.1007/11795131\_107}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rskt/MaWJL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.