default search action
Zhen Ren
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Chunfeng Li, Xiping Xu, Siyuan Liu, Zhen Ren:
A Method for Measuring Shaft Diameter Based on Light Stripe Image Enhancement. Sensors 24(1): 303 (2024) - 2023
- [j16]Chunfeng Li, Xiping Xu, Zhen Ren, Siyuan Liu:
Research on Visual Measurement of Aperture and Hole Group Center Distance Based on Geometric Constraint. Symmetry 15(6): 1255 (2023) - [j15]Zhaoyang Zhang, Zhen Ren, Chao Tao, Yunsheng Zhang, Chengli Peng, Haifeng Li:
GraSS: Contrastive Learning With Gradient-Guided Sampling Strategy for Remote Sensing Image Semantic Segmentation. IEEE Trans. Geosci. Remote. Sens. 61: 1-14 (2023) - [c33]Wei Zhang, De-Liang Hua, Si-Hai Li, Zhen Ren, Zhi-Ling Yu:
An improved genetic programming algorithm based on bloat control. ICBASE 2023: 406-413 - [c32]Yunhao Chen, Yunjie Zhu, Zihui Yan, Zhen Ren, Yifan Huang, Jianlu Shen, Lifang Chen:
Effective Audio Classification Network Based on Paired Inverse Pyramid Structure and Dense MLP Block. ICIC (2) 2023: 70-84 - [c31]Yunhao Chen, Zihui Yan, Yunjie Zhu, Zhen Ren, Jianlu Shen, Yifan Huang:
Data Augmentation for Environmental Sound Classification Using Diffusion Probabilistic Model with Top-K Selection Discriminator. ICIC (2) 2023: 283-295 - [i2]Yunhao Chen, Yunjie Zhu, Zihui Yan, Jianlu Shen, Zhen Ren, Yifan Huang:
Data Augmentation for Environmental Sound Classification Using Diffusion Probabilistic Model with Top-k Selection Discriminator. CoRR abs/2303.15161 (2023) - 2022
- [c30]Mingmin He, Zhen Ren, Ting Wang, Yuhan Xie:
Self-Supervised Interest Recommendation Based Intelligent System Design on Mental Health Education. RICAI 2022: 779-784 - 2020
- [j14]Zhen Ren, Shi-Shan Qi, Wen Wu, Zhongxiang Shen:
Function-Reconfigurable Water Short Backfire Antenna. IEEE Access 8: 203667-203673 (2020) - [j13]Hui Xue, Zhen Ren:
Sketch discriminatively regularized online gradient descent classification. Appl. Intell. 50(5): 1367-1378 (2020) - [c29]Zhen Ren, Hui Zhang, Hao Wu:
Measurement-Aided Cubature Weight Correction GM-PHD algorithm for Muti-target tracking. ICSPCC 2020: 1-5
2010 – 2019
- 2019
- [j12]Zhen Ren, Linda Trinh, Michael Cooke, Sergio Carrillo De Hert, Jessica Silvaluengo, Jon Ashley, Ibtisam E. Tothill, Thomas L. Rodgers:
Development of a Novel Linear ERT Sensor to Measure Surface Deposits. IEEE Trans. Instrum. Meas. 68(3): 754-761 (2019) - 2018
- [c28]Zhen Ren, Jiying Li, Hao Wu:
A new robust CKF for jammer tracking. ICSPCC 2018: 1-6 - [c27]Wuqiang Yang, Zhen Ren, Masahiro Takei, Jiafeng Yao:
Medical applications of electrical tomography. IST 2018: 1-6 - 2016
- [j11]Zhen Ren, Wuqiang Yang:
Development of a Navigation Tool for Revision Total Hip Surgery Based on Electrical Impedance Tomography. IEEE Trans. Instrum. Meas. 65(12): 2748-2757 (2016) - [j10]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang, David T. Nguyen:
Throughput Assurance for Multiple Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 546-557 (2016) - 2014
- [j9]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang:
Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing. IEEE Internet Things J. 1(3): 243-254 (2014) - 2013
- [j8]Andrew P. White, Zhen Ren, Guoming Zhu, Jongeun Choi:
Mixed H2/H∞ Observer-Based LPV Control of a Hydraulic Engine Cam Phasing Actuator. IEEE Trans. Control. Syst. Technol. 21(1): 229-238 (2013) - [j7]Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks. IEEE Trans. Parallel Distributed Syst. 24(9): 1741-1751 (2013) - [j6]Robert Thompson, Gang Zhou, Lei Lu, Sudha Krishnamurthy, Hover Dong, Xin Qi, Yantao Li, Matthew Keally, Zhen Ren:
A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks. Wirel. Pers. Commun. 68(1): 131-151 (2013) - [c26]Xin Qi, Matthew Keally, Gang Zhou, Yantao Li, Zhen Ren:
AdaSense: Adapting sampling rates for activity recognition in Body Sensor Networks. IEEE Real-Time and Embedded Technology and Applications Symposium 2013: 163-172 - 2011
- [c25]Zhen Ren, Guoming G. Zhu:
Modeling and control of an electric variable valve timing system for SI and HCCI combustion mode transition. ACC 2011: 979-984 - [c24]Andrew J. Pyles, Zhen Ren, Gang Zhou, Xue Liu:
SiFi: exploiting VoIP silence for WiFi energy savings insmart phones. UbiComp 2011: 325-334 - [c23]Xue Wang, Zhen Ren:
Recognition Algorithm of Laser Echo Signal in Tuyere Raceway Based on Multiwavelet Denoising and ICA. ICDMA 2011: 889-892 - [c22]Zhen Ren, Gang Zhou, Andrew J. Pyles, Matthew Keally, Weizhen Mao, Haining Wang:
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs. INFOCOM 2011: 2750-2758 - [c21]Yantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. IPCCC 2011: 1-8 - 2010
- [c20]Zhen Ren, Guoming G. Zhu:
Multirate closed-loop system identification of a variable valve timing actuator for an internal combustion engine. ACC 2010: 664-669 - [c19]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100
2000 – 2009
- 2009
- [c18]Gang Zhou, Lei Lu, Sudha Krishnamurthy, Matthew Keally, Zhen Ren:
SAS: Self-Adaptive Spectrum Management for Wireless Sensor Networks. ICCCN 2009: 1-6 - 2008
- [j5]Guo-Sheng Hu, Feng-Feng Zhu, Zhen Ren:
Power quality disturbance identification using wavelet packet energy entropy and weighted support vector machines. Expert Syst. Appl. 35(1-2): 143-149 (2008) - [j4]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren:
Secure multimedia watermarking authentication in wavelet domain. J. Electronic Imaging 17(3): 033010 (2008) - [c17]Kejun Wang, Zhen Ren, Xinyan Xiong:
Combination of Wavelet snd SIFT Features for Image Classification Using Trained Gaussion Mixture Model. IIH-MSP 2008: 79-82 - 2007
- [j3]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Commutative Encryption and Watermarking in Video Compression. IEEE Trans. Circuits Syst. Video Technol. 17(6): 774-778 (2007) - [c16]Jinfeng Zhang, Ronggang Wang, Zhen Ren, Jianwei Niu:
Server-Aided Adaptive Video Streaming Over Multi-Hop Path. ICME 2007: 40-43 - [c15]Guangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118 - [c14]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Joint Fingerprint Embedding and Decryption for Video Distribution. ICME 2007: 1523-1526 - [c13]Guopei Wu, Zhen Ren, Hongning Li:
Investigation on the Optimum Routine Test Interval of Protective Equipments Based on Reliability Analysis. IMECS 2007: 1668-1673 - [c12]Hongning Li, Zhen Ren:
Research on the Optimum Inspection Interval of Digital Relay Based on MIS. IMECS 2007: 1739-1743 - [c11]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Secure Media Distribution Scheme Based on Chaotic Neural Network. ISNN (2) 2007: 79-87 - [c10]Zhongxuan Liu, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, Haila Wang:
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. IWDW 2007: 335-349 - [c9]Yuehu Liu, Yuanqi Su, Yang Yang, Fengjuan Wang, Maojun Yuan, Zhen Ren:
A Facial Sketch Animation Generator for Mobile Communication. MVA 2007: 532-535 - [i1]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
On the Performance of Joint Fingerprint Embedding and Decryption Scheme. CoRR abs/0706.3076 (2007) - 2006
- [j2]Zhongxuan Liu, Shiguo Lian, Zhen Ren:
Quaternion Diffusion for Color Image Filtering. J. Comput. Sci. Technol. 21(1): 126-136 (2006) - [j1]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consumer Electron. 52(2): 621-629 (2006) - [c8]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Secure Distribution Scheme for Compressed Data Streams. ICIP 2006: 1953-1956 - [c7]Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. AIAI 2006: 681-688 - [c6]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang:
Hash function based on chaotic neural networks. ISCAS 2006 - [c5]Zhongxuan Liu, Shiguo Lian, Ronggang Wang, Zhen Ren:
Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. IWDW 2006: 308-322 - [c4]Zhongxuan Liu, Shiguo Lian, Zhen Ren:
Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain. PCM 2006: 56-63 - [c3]Shiguo Lian, Zhongxuan Liu, Jinwei Wang, Zhen Ren, Haila Wang:
Secure multimedia browser over network. Visual Information Processing 2006: 62460T - [c2]Yuanqi Su, Yuehu Liu, Yunfeng Zhu, Zhen Ren:
Facial Sketch Rendering and Animation for Fun Communications. VSMM 2006: 486-494 - 2005
- [c1]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang:
Selective Video Encryption Based on Advanced Video Coding. PCM (2) 2005: 281-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint