Wenting Li
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
Beyond low-dimensional features: Enhancing semi-supervised medical image semantic segmentation with advanced consistency learning techniques.
Expert Syst. Appl., 2025
2024
A Full-Metal Dual-Band Millimeter-Wave Antenna Array With Concomitant Multifold Orthogonal Beamforming for V2V and V2I Communications.
IEEE Trans. Veh. Technol., July, 2024
Physics-Constrained Adversarial Training for Neural Networks in Stochastic Power Grids.
IEEE Trans. Artif. Intell., March, 2024
IEEE Trans. Instrum. Meas., 2024
Surface Depth Estimation From Multiview Stereo Satellite Images With Distribution Contrast Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
IEEE Signal Process. Lett., 2024
Personal credit default prediction fusion framework based on self-attention and cross-network algorithms.
Eng. Appl. Artif. Intell., 2024
Cascading Blackout Severity Prediction with Statistically-Augmented Graph Neural Networks.
CoRR, 2024
Proceedings of the Advances in Swarm Intelligence, 2024
2023
Symmetry, December, 2023
Sensors, December, 2023
Appl. Intell., December, 2023
Dynamic Lane Reversal Strategy in Intelligent Transportation Systems in Smart Cities.
Sensors, September, 2023
An artificial immune differential evolution algorithm for scheduling a distributed heterogeneous flexible flowshop.
Appl. Soft Comput., September, 2023
From gram to attention matrices: a monotonicity constrained method for eeg-based emotion classification.
Appl. Intell., September, 2023
Mob. Networks Appl., August, 2023
Time-Extracting Wavelet Transform for Characterizing Impulsive-Like Signals and Theoretical Analysis.
Circuits Syst. Signal Process., July, 2023
A symmetric adaptive visibility graph classification method of orthogonal signals for automatic modulation classification.
IET Commun., June, 2023
A Novel State Estimation Method for Smart Grid Under Consecutive Denial of Service Attacks.
IEEE Syst. J., March, 2023
A novel multi-objective immune optimization algorithm for under sampling software defect prediction problem.
Concurr. Comput. Pract. Exp., February, 2023
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023
Parameter analysis of chirplet transform and high-resolution time-frequency representation via chirplets combination.
Signal Process., 2023
Newton time-extracting wavelet transform: An effective tool for characterizing frequency-varying signals with weakly-separated components and theoretical analysis.
Signal Process., 2023
Quantum Inf. Process., 2023
Word-Graph2vec: An efficient word embedding approach on word co-occurrence graph using random walk sampling.
CoRR, 2023
Word-Graph2vec: An Efficient Word Embedding Approach on Word Co-occurrence Graph Using Random Walk Technique.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection.
Proceedings of the 8th International Conference on Cyber Security and Information Engineering, 2023
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
PPGN: Physics-Preserved Graph Networks for Real-Time Fault Location in Distribution Systems with Limited Observation and Labels.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Crowd counting in congested scene by CNN and Transformer: Crowd counting for converged networks.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
2022
Genom. Proteom. Bioinform., August, 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
Digit. Signal Process., 2022
Appl. Math. Lett., 2022
A Monotonicity Constrained Attention Module for Emotion Classification with Limited EEG Data.
Proceedings of the Medical Image Learning with Limited and Noisy Data, 2022
2021
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
A Pattern Reconfigurable Antenna With Four Switchable Directional Beams Using Characteristic Mode Analysis.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021
Optimization of Antenna Design Using the Artificial Neural Network and the Simulated Annealing Algorithm.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021
2020
Traffic incident detection based on the width characteristic of the moving object marker.
Int. J. Inf. Commun. Technol., 2020
2019
Multibeam Dual-Circularly Polarized Reflectarray for Connected and Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019
ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks.
IEEE Trans. Syst. Man Cybern. Syst., 2019
IEEE Trans. Computers, 2019
An app usage recommender system: improving prediction accuracy for both warm and cold start users.
Multim. Syst., 2019
MC2ETS: 移动云计算中一种能效任务调度算法 (MC2ETS: An Energy-efficient Tasks Scheduling Algorithm in Mobile Cloud Computing).
计算机科学, 2019
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction.
Future Gener. Comput. Syst., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
2018
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018
J. Signal Process. Syst., 2018
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018
Neural Comput. Appl., 2018
CoRR, 2018
Predictor: an app cold start recommender system based on user similarity and app periodicity.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018
Event Identification Using Extracted Features from High-dimensional Power System Data.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
Uncertainty Evaluation of the Waveform Parameters of 1-kV Low-Impedance Impulse Voltage Calibrator.
IEEE Trans. Instrum. Meas., 2016
Unexpected Selectivity of UV Light Activated Metal-Oxide-Semiconductor Gas Sensors by Two Different Redox Processes.
J. Sensors, 2016
Performance of Quantize-Map-Forward Based Cooperative Multicast Systems With Successive Relaying.
IEEE Commun. Lett., 2016
Proceedings of the Information Systems Security and Privacy, 2016
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
2013
Differential invariants for Hirota-Ramani equation and Drinfel'd-Sokolov-Wilson system.
Commun. Nonlinear Sci. Numer. Simul., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Cancer core modules identification through genomic and transcriptomic changes correlation detection at network level.
BMC Syst. Biol., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
2009
Exploring phenotype-associated modules in an oral cavity tumor using an integrated framework.
Bioinform., 2009
2008
Generalized multiple Riccati equations rational expansion method with symbolic computation to construct exact complexiton solutions of nonlinear partial differential equations.
Appl. Math. Comput., 2008