Wenting Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Beyond low-dimensional features: Enhancing semi-supervised medical image semantic segmentation with advanced consistency learning techniques.
Expert Syst. Appl., 2025

2024
A Full-Metal Dual-Band Millimeter-Wave Antenna Array With Concomitant Multifold Orthogonal Beamforming for V2V and V2I Communications.
IEEE Trans. Veh. Technol., July, 2024

Physics-Constrained Adversarial Training for Neural Networks in Stochastic Power Grids.
IEEE Trans. Artif. Intell., March, 2024

Evaluation Method of Impulse Voltage Scale Factor Based on Energy Spectral Density.
IEEE Trans. Instrum. Meas., 2024

Surface Depth Estimation From Multiview Stereo Satellite Images With Distribution Contrast Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Newton Time-Reassigned Multi-Synchrosqueezing Wavelet Transform.
IEEE Signal Process. Lett., 2024

Personal credit default prediction fusion framework based on self-attention and cross-network algorithms.
Eng. Appl. Artif. Intell., 2024

LEVIS: Large Exact Verifiable Input Spaces for Neural Networks.
CoRR, 2024

Cascading Blackout Severity Prediction with Statistically-Augmented Graph Neural Networks.
CoRR, 2024

Circle Chaotic Search-Based Butterfly Optimization Algorithm.
Proceedings of the Advances in Swarm Intelligence, 2024

2023
Non-Classical Symmetry Analysis of a Class of Nonlinear Lattice Equations.
Symmetry, December, 2023

Development of a Wideband Precision Electric Field Measuring Sensor.
Sensors, December, 2023

Multi-scale variable precision covering rough sets and its applications.
Appl. Intell., December, 2023

Dynamic Lane Reversal Strategy in Intelligent Transportation Systems in Smart Cities.
Sensors, September, 2023

An artificial immune differential evolution algorithm for scheduling a distributed heterogeneous flexible flowshop.
Appl. Soft Comput., September, 2023

From gram to attention matrices: a monotonicity constrained method for eeg-based emotion classification.
Appl. Intell., September, 2023

Bi-Level Optimization Model for Greener Transportation by Vehicular Networks.
Mob. Networks Appl., August, 2023

Time-Extracting Wavelet Transform for Characterizing Impulsive-Like Signals and Theoretical Analysis.
Circuits Syst. Signal Process., July, 2023

A symmetric adaptive visibility graph classification method of orthogonal signals for automatic modulation classification.
IET Commun., June, 2023

A Novel State Estimation Method for Smart Grid Under Consecutive Denial of Service Attacks.
IEEE Syst. J., March, 2023

A novel multi-objective immune optimization algorithm for under sampling software defect prediction problem.
Concurr. Comput. Pract. Exp., February, 2023

HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023

Parameter analysis of chirplet transform and high-resolution time-frequency representation via chirplets combination.
Signal Process., 2023

Newton time-extracting wavelet transform: An effective tool for characterizing frequency-varying signals with weakly-separated components and theoretical analysis.
Signal Process., 2023

Phase-matching quantum key distribution based on heralded pair-coherent source.
Quantum Inf. Process., 2023

Reveal the Mathematical Structures of Honeyword Security Metrics.
CoRR, 2023

Word-Graph2vec: An efficient word embedding approach on word co-occurrence graph using random walk sampling.
CoRR, 2023

Word-Graph2vec: An Efficient Word Embedding Approach on Word Co-occurrence Graph Using Random Walk Technique.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection.
Proceedings of the 8th International Conference on Cyber Security and Information Engineering, 2023

An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Improved Wordpcfg for Passwords with Maximum Probability Segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2023

PPGN: Physics-Preserved Graph Networks for Real-Time Fault Location in Distribution Systems with Limited Observation and Labels.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Crowd counting in congested scene by CNN and Transformer: Crowd counting for converged networks.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

Real-time road scene segmentation based on knowledge distillation.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
A Global Multiregional Proteomic Map of the Human Cerebral Cortex.
Genom. Proteom. Bioinform., August, 2022

A Single-Layer 10-30 GHz Reflectarray Antenna for the Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

Self-matched extracting wavelet transform and signal reconstruction.
Digit. Signal Process., 2022

Ranking-Based Physics-Informed Line Failure Detection in Power Grids.
CoRR, 2022

Theoretical analysis of time-reassigned synchrosqueezing wavelet transform.
Appl. Math. Lett., 2022

A Monotonicity Constrained Attention Module for Emotion Classification with Limited EEG Data.
Proceedings of the Medical Image Learning with Limited and Noisy Data, 2022

2021
A Low-Profile Circularly Polarized Conical-Beam Antenna with Wide Overlap Bandwidth.
Wirel. Commun. Mob. Comput., 2021

Practical Threshold Multi-Factor Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Outsourcing Proofs of Retrievability.
IEEE Trans. Cloud Comput., 2021

Physics-Informed Graph Learning for Robust Fault Location in Distribution Systems.
CoRR, 2021

EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

Incrementally Updateable Honey Password Vaults.
Proceedings of the 30th USENIX Security Symposium, 2021

Regulating Storage Overhead in Existing PoW-based Blockchains.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Machine Learning for Variance Reduction in Online Experiments.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Pattern Reconfigurable Antenna With Four Switchable Directional Beams Using Characteristic Mode Analysis.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

Optimization of Antenna Design Using the Artificial Neural Network and the Simulated Annealing Algorithm.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

A Novel Base Station Antenna Operating in the 0.68-1 GHz Frequency Range.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

A Pattern Reconfigurable SIW Horn Antenna Realized by PIN Diode Switches.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

2020
Traffic incident detection based on the width characteristic of the moving object marker.
Int. J. Inf. Commun. Technol., 2020

Physics Regulated Neural Network for High Impedance Faults Detection.
CoRR, 2020

2019
Multibeam Dual-Circularly Polarized Reflectarray for Connected and Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019

ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Proofs of Writing for Robust Storage.
IEEE Trans. Parallel Distributed Syst., 2019

Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing.
IEEE Trans. Computers, 2019

An app usage recommender system: improving prediction accuracy for both warm and cold start users.
Multim. Syst., 2019

MC2ETS: 移动云计算中一种能效任务调度算法 (MC2ETS: An Energy-efficient Tasks Scheduling Algorithm in Mobile Cloud Computing).
计算机科学, 2019

Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction.
Future Gener. Comput. Syst., 2019

Probability Model Transforming Encoders Against Encoding Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Novel QGA-UKF Algorithm for Dynamic State Estimation of Power System.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019

The Automatic Text Classification Method Based on BERT and Feature Union.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Password Expiration Strategy: A Perspective of Ecological Memory.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Breaking Three Remote user Authentication Systems for Mobile Devices.
J. Signal Process. Syst., 2018

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018

RegFrame: fast recognition of simple human actions on a stand-alone mobile device.
Neural Comput. Appl., 2018

Toward Fairness of Cryptocurrency Payments.
IEEE Secur. Priv., 2018

Real-time Fault Localization in Power Grids With Convolutional Neural Networks.
CoRR, 2018

Predictor: an app cold start recommender system based on user similarity and app periodicity.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

Image processing based on variable interval interpolation wavelet transform.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

Event Identification Using Extracted Features from High-dimensional Power System Data.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

Securing Proof-of-Stake Blockchain Protocols.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Breaking Two Remote User Authentication Systems for Mobile Devices.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
Uncertainty Evaluation of the Waveform Parameters of 1-kV Low-Impedance Impulse Voltage Calibrator.
IEEE Trans. Instrum. Meas., 2016

Unexpected Selectivity of UV Light Activated Metal-Oxide-Semiconductor Gas Sensors by Two Different Redox Processes.
J. Sensors, 2016

Performance of Quantize-Map-Forward Based Cooperative Multicast Systems With Successive Relaying.
IEEE Commun. Lett., 2016

Towards Fairness of Cryptocurrency Payments.
CoRR, 2016

SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Secure Erasure and Code Update in Legacy Sensors.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Identifying the Missing Tags in Categorized RFID Systems.
Int. J. Distributed Sens. Networks, 2014

PrivLoc: Preventing Location Tracking in Geofencing Services.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Differential invariants for Hirota-Ramani equation and Drinfel'd-Sokolov-Wilson system.
Commun. Nonlinear Sci. Numer. Simul., 2013

PoWerStore: proofs of writing for efficient and robust storage.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Proofs of Writing for Efficient and Robust Storage
CoRR, 2012

Cancer core modules identification through genomic and transcriptomic changes correlation detection at network level.
BMC Syst. Biol., 2012

Assisting Server for Secure Multi-Party Computation.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

2009
Exploring phenotype-associated modules in an oral cavity tumor using an integrated framework.
Bioinform., 2009

2008
Generalized multiple Riccati equations rational expansion method with symbolic computation to construct exact complexiton solutions of nonlinear partial differential equations.
Appl. Math. Comput., 2008


  Loading...