![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2021
- Kehe Wu, Jiawei Li, Bo Zhang:
Abnormal Detection of Wireless Power Terminals in Untrusted Environment Based on Double Hidden Markov Model. IEEE Access 9: 18682-18691 (2021) - Wenchao Cui, Qiong Lu, Asif Moin Qureshi, Wei Li, Kehe Wu:
An adaptive LeNet-5 model for anomaly detection. Inf. Secur. J. A Glob. Perspect. 30(1): 19-29 (2021) - 2020
- Kehe Wu
, Jiawei Li, Bo Zhang
, Zongchao Yu
, Xuan Liu
:
Preventive Dispatch Strategy Against FDIA Induced Overloads in Power Systems With High Wind Penetration. IEEE Access 8: 210452-210461 (2020) - Kehe Wu, Zuge Chen, Xiaoliang Zhang, Wei Li:
Improvement of Classification in One-Stage Detector. CoRR abs/2011.10465 (2020) - Kehe Wu, Zuge Chen, Qi Ma, Xiaoliang Zhang, Wei Li:
Decoupled Self Attention for Accurate One Stage Object Detection. CoRR abs/2012.07630 (2020) - 2019
- Zuge Chen
, Kehe Wu, Yuanbo Li, Minjian Wang, Wei Li:
SSD-MSN: An Improved Multi-Scale Object Detection Network Based on SSD. IEEE Access 7: 80622-80632 (2019) - Jianyong Xue, Kehe Wu, Yan Zhou:
A risk analysis and prediction model of electric power GIS based on deep learning. Int. J. Comput. Sci. Eng. 18(1): 39-43 (2019) - 2018
- Wei Li, Rui Li
, Kehe Wu, Rui Cheng, Linping Su, Wenchao Cui:
Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications. IEEE Access 6: 71194-71207 (2018) - Kehe Wu, Zuge Chen
, Wei Li:
A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks. IEEE Access 6: 50850-50859 (2018) - 2017
- Kehe Wu, Yayun Zhu, Quan Li, Ziwei Wu:
A distributed real-time data prediction framework for large-scale time-series data using stream processing. Int. J. Intell. Comput. Cybern. 10(2): 145-165 (2017) - 2015
- Kehe Wu, Long Chen, Yi Li:
A Trusted-based Cloud Computing Virtual Storage System and Key Technologies. Int. J. Comput. Commun. Control 10(4): 579-592 (2015) - 2014
- Long Chen, Kehe Wu, Yi Li:
A Load Balancing Algorithm Based on Maximum Entropy Methods in Homogeneous Clusters. Entropy 16(11): 5677-5697 (2014) - 2013
- Zhuxiao Wang, Jing Guo, Fei Chen, Kehe Wu, Peng Wang:
An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings. J. Softw. 8(1): 243-250 (2013) - 2012
- Zhuxiao Wang, Zhitao Guan, Wei Li, Kehe Wu, Jing Guo, Guanhua Tian:
A Tableau-Based Reasoning Algorithm for Distributed Dynamic Description Logics. ICICA (1) 2012: 192-199 - Zhuxiao Wang, Hui Peng, Jing Guo, Ying Zhang, Kehe Wu, Huan Xu, Xiaofeng Wang:
An Architecture Description Language Based on Dynamic Description Logics. Intelligent Information Processing 2012: 157-166 - 2011
- Xiaohui Wang, Kehe Wu, Yuhan Xu:
The data model and structure of power GIS. GrC 2011: 734-738 - Kehe Wu, Xiao Tu, Cheng Duan:
Research and Implementation of Entropy-Based Model to Evaluation of the Investment Efficiency of Grid Enterprise. WISM (2) 2011: 44-50 - 2010
- Kehe Wu, Tong Zhang, Fei Chen:
Research on Active Controllable Defense Model Based on Zero-PDR Model. IITSI 2010: 572-575 - Wei Li, Zhiwei Feng, Jing Zhou, Kehe Wu, Jing Teng
:
Dynamic Increasing the Capacity of Transmission Line Based on the Kylin Operating System. SUComS 2010: 10-16 - Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan:
Research on a Behavior-based active controllable defense model and its application. WCNIS 2010: 687-691 - 2009
- Kehe Wu, Xia He, Tingshun Li, Hongyu Tao:
To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene. Comput. Inf. Sci. 2(1): 137-141 (2009) - Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma:
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. IAS 2009: 770-773 - Kehe Wu, Tong Zhang, Gang Ma:
The Design and Implementation of Mandatory Running Control. Software Engineering Research and Practice 2009: 279-282 - 2007
- Yinglong Ma, Beihong Jin, Yuancheng Li, Kehe Wu:
A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments. PAKDD 2007: 183-192 - Yuancheng Li, Kehe Wu, Yinglong Ma
, Shipeng Zhang:
Image Digital Watermarking Technique Based on Kernel Independent Component Analysis. RSFDGrC 2007: 467-474 - 2006
- Yinglong Ma
, Kehe Wu, Yi Zheng, Wei Li:
Multi-agent Coordination Based on Semantic Approximation. IAT Workshops 2006: 510-513 - Yinglong Ma
, Kehe Wu, Beihong Jin, Wei Li:
A Combination Framework for Semantic Based Query Across Multiple Ontologies. PRIMA 2006: 463-470 - Yinglong Ma
, Kehe Wu, Beihong Jin, Shaohua Liu:
Approximate Semantic Query Based on Multi-agent Systems. RSKT 2006: 735-741
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-07 19:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint