Wenjun Luo

Orcid: 0009-0004-9576-9820

According to our database1, Wenjun Luo authored at least 31 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fourier Feature Refiner Network With Soft Thresholding for Machinery Fault Diagnosis Under Highly Noisy Conditions.
IEEE Internet Things J., July, 2024

Digital Forensics for Automotive Intelligent Networked Terminal Devices.
IEEE Trans. Veh. Technol., April, 2024

Hypergraph-based convex semi-supervised unconstraint symmetric matrix factorization for image clustering.
Inf. Sci., 2024

2023
Sequential Routing-based Time-division Multiplexing Optimization for Multi-FPGA Systems.
ACM Trans. Design Autom. Electr. Syst., November, 2023

High-Accuracy Filtering of Forest Scenes Based on Full-Waveform LiDAR Data and Hyperspectral Images.
Remote. Sens., July, 2023

FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023

Composite Wafer Defect Recognition Framework Based on Multiview Dynamic Feature Enhancement With Class-Specific Classifier.
IEEE Trans. Instrum. Meas., 2023

Research on disturbing white-box cryptography algorithm based on local differential privacy.
Secur. Priv., 2023

Numerical simulation of anti-plane wave propagation in heterogeneous media.
Appl. Math. Lett., 2023

2022
Settlement of an Existing Tunnel Induced by Crossing Shield Tunneling Involving Residual Jacking Force.
Symmetry, 2022

Extracting Urban Road Footprints from Airborne LiDAR Point Clouds with PointNet++ and Two-Step Post-Processing.
Remote. Sens., 2022

A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022

2021
A Precisely One-Step Registration Methodology for Optical Imagery and LiDAR Data Using Virtual Point Primitives.
Remote. Sens., 2021

2.5D singular boundary method for acoustic wave propagation.
Appl. Math. Lett., 2021

2020
Direct Georeferencing for the Images in an Airborne LiDAR System by Automatic Boresight Misalignments Calibration.
Sensors, 2020

Static Analysis of Integer Overflow of Smart Contracts in Ethereum.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
A time-aware searchable encryption scheme for EHRs.
Digit. Commun. Networks, 2019

2018
Calculating the normalized Laplacian spectrum and the number of spanning trees of linear pentagonal chains.
J. Comput. Appl. Math., 2018

Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2016
Multi-Key Searchable Encryption with Designated Server.
Intell. Autom. Soft Comput., 2016

2015
Multi-thread Connection Based Scheduling Algorithm for Network on Chip.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Dynamic Searchable Encryption with Multi-user Private Search for Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Analysis of Dynamic Behavior for Ballastless Track-Bridge with a Hybrid Method.
Intell. Autom. Soft Comput., 2014

2012
Public key encryption with keyword search based on factoring.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Ensuring the data integrity in cloud data storage.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2007
DFMA for Internet-Based Collaborative Design.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2005
Optimal resource allocation and leaky bucket based power control for CBR MIMO systems.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A study of secure multi-party elementary function computation protocols.
Proceedings of the 3rd International Conference on Information Security, 2004

1999
Receiver-Initiated Resource Renegotiation for VBR Video Transport.
Proceedings of the 1999 International Conference on Image Processing, 1999

1997
Quality Control for VBR Video over ATM Networks.
IEEE J. Sel. Areas Commun., 1997

1995
Adaptive data partitioning for MPEG-2 video transmission over ATM based networks.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995


  Loading...