Wenjin Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2022
Thangka Yidam classification based on DenseNet and SENet.
J. Electronic Imaging, 2022

Few shot object detection for headdresses and seats in Thangka Yidam based on ResNet and deformable convolution.
Connect. Sci., 2022

2020
An Intelligent Multi-Sensor Variable Spray System with Chaotic Optimization and Adaptive Fuzzy Control.
Sensors, 2020

Driver fatigue detection based on deeply-learned facial expression representation.
J. Vis. Commun. Image Represent., 2020

2019
A Multi-Agent Optimization Method for Preemptive Resource-Constrained Project Scheduling.
Int. J. Inf. Technol. Proj. Manag., 2019

2018
An efficient perceptual hashing based on improved spectral entropy for speech authentication.
Multim. Tools Appl., 2018

High Capacity Reversible Data Hiding Algorithm for Color Image Based on Bicubic Interpolation Extension.
J. Inf. Hiding Multim. Signal Process., 2018

Exploring the role of intellectual capital in supply chain intelligence integration.
Ind. Manag. Data Syst., 2018

Risk management and firm performance: the moderating role of supplier integration.
Ind. Manag. Data Syst., 2018

Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor.
Int. J. Netw. Secur., 2018

A new quality assessment for Thangka image inpainting.
Concurr. Comput. Pract. Exp., 2018

2017
Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio.
Int. J. Netw. Secur., 2017

2016
An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System.
J. Inf. Hiding Multim. Signal Process., 2016

An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream.
J. Inf. Hiding Multim. Signal Process., 2016

Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment.
Proceedings of the Intelligent Computing Theories and Application, 2016

Error Based Nyström Spectral Clustering Image Segmentation.
Proceedings of the Intelligent Computing Theories and Application, 2016

2013
A quantitative study of virtual machine live migration.
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013

2010
The good, the bad and the ugly of consumer cloud storage.
ACM SIGOPS Oper. Syst. Rev., 2010

2008
Solaris Virtualization Options.
login Usenix Mag., 2008

2007
Quantifying the performance isolation properties of virtualization systems.
Proceedings of the Workshop on Experimental Computer Science, 2007

Encoding First Order Proofs in SAT.
Proceedings of the Automated Deduction, 2007


  Loading...