Peilun Wu

Orcid: 0000-0002-4325-0507

According to our database1, Peilun Wu authored at least 18 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LOS and NLOS Targets Localization in an L-Shaped Corner.
Proceedings of the IGARSS 2024, 2024

2023
Non-Line-of-Sight Targets Localization Algorithm via Joint Estimation of DoD and DoA.
IEEE Trans. Instrum. Meas., 2023

NLOS Positioning for Building Layout and Target Based on Association and Hypothesis Method.
IEEE Trans. Geosci. Remote. Sens., 2023

Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation.
CoRR, 2023

2022
Joint Estimation of NLOS Building Layout and Targets via Sparsity-Driven Approach.
IEEE Trans. Geosci. Remote. Sens., 2022

Ultrawideband Tomographic Imaging in Multipath-Rich Environment.
IEEE Geosci. Remote. Sens. Lett., 2022

A Multi-Domain Fusion Human Motion Recognition Method Based on Lightweight Network.
IEEE Geosci. Remote. Sens. Lett., 2022

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Hunter in the Dark: Discover Anomalous Network Activities Using Deep Ensemble Networks.
CoRR, 2021

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector.
CoRR, 2021

DualNet: Locate Then Detect Effective Payload with Deep Attention Network.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Pelican: A Deep Residual Network for Network Intrusion Detection.
CoRR, 2020

Densely Connected Residual Network for Attack Recognition.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Pelican: A Deep Residual Network for Network Intrusion Detection.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

2019
Development of a Smart Helmet for Strategical BCI Applications.
Sensors, 2019

A Transfer Learning Approach for Network Intrusion Detection.
CoRR, 2019

LuNet: A Deep Neural Network for Network Intrusion Detection.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
Method for Establishing Handwritten Character Data Set of Traditional Chinese Medicine Prescription.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018


  Loading...