Wenda Qin

According to our database1, Wenda Qin authored at least 13 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine-Generated Text Localization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Age-constrained Ear Recognition: The EICZA Dataset and SASE Baseline Model.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
Text and metadata extraction from scanned Arabic documents using support vector machines.
J. Inf. Sci., 2022

2021
Extracting text from scanned Arabic books: a large-scale benchmark dataset and a fine-tuned Faster-R-CNN model.
Int. J. Document Anal. Recognit., 2021

Explore the Potential Performance of Vision-and-Language Navigation Model: a Snapshot Ensemble Method.
CoRR, 2021

2020
LAL: Linguistically Aware Learning for Scene Text Recognition.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2018
A Joint Multi-Criteria Utility-Based Network Selection Approach for Vehicle-to-Infrastructure Networking.
IEEE Trans. Intell. Transp. Syst., 2018

Making scanned Arabic documents machine accessible using an ensemble of SVM classifiers.
Int. J. Document Anal. Recognit., 2018

LABA: Logical Layout Analysis of Book Page Images in Arabic Using Multiple Support Vector Machines.
Proceedings of the IEEE 2nd International Workshop on Arabic and Derived Script Analysis and Recognition, 2018

2016
The analysis and practice of the human-computer interaction course system in Stanford University.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

2015
Multi-scale anomaly detection for high-speed network traffic.
Trans. Emerg. Telecommun. Technol., 2015

2014
Energy-efficient cognitive access approach to convergence communications.
Sci. China Inf. Sci., 2014

2011
A Wavelet-Based Detection Approach to Traffic Anomalies.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...