default search action
Wenjun Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Huan Wang, Wenjun Luo, Zhiliang Liu, Junhao Zhang, Ming Jian Zuo:
Fourier Feature Refiner Network With Soft Thresholding for Machinery Fault Diagnosis Under Highly Noisy Conditions. IEEE Internet Things J. 11(13): 22880-22891 (2024) - [j19]Wenjun Luo, Zezhong Wu, Nan Zhou:
Hypergraph-based convex semi-supervised unconstraint symmetric matrix factorization for image clustering. Inf. Sci. 680: 121138 (2024) - [j18]Zigang Chen, Qinyu Mu, Wenjun Luo, Xingchun Yang, Danlong Li, Xin Shao, Yuhong Liu, Haihua Zhu:
Digital Forensics for Automotive Intelligent Networked Terminal Devices. IEEE Trans. Veh. Technol. 73(4): 5128-5138 (2024) - 2023
- [j17]Xing Wei, Chengliang Rao, Shenshen Chen, Wenjun Luo:
Numerical simulation of anti-plane wave propagation in heterogeneous media. Appl. Math. Lett. 135: 108436 (2023) - [j16]Zigang Chen, Zhiquan Cheng, Wenjun Luo, Jin Ao, Yuhong Liu, Kai Sheng, Long Chen:
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices. Internet Things 21: 100685 (2023) - [j15]Wenjun Luo, Hongchao Ma, Jialin Yuan, Liang Zhang, Haichi Ma, Zhan Cai, Weiwei Zhou:
High-Accuracy Filtering of Forest Scenes Based on Full-Waveform LiDAR Data and Hyperspectral Images. Remote. Sens. 15(14): 3499 (2023) - [j14]Wenjun Luo, Die Lai, Zesen Dai:
Research on disturbing white-box cryptography algorithm based on local differential privacy. Secur. Priv. 6(6) (2023) - [j13]Wenjun Luo, Huan Wang:
Composite Wafer Defect Recognition Framework Based on Multiview Dynamic Feature Enhancement With Class-Specific Classifier. IEEE Trans. Instrum. Meas. 72: 1-12 (2023) - [j12]Wenxiong Lin, Haojie Wu, Peng Gao, Wenjun Luo, Shuting Cai, Xiaoming Xiong:
Sequential Routing-based Time-division Multiplexing Optimization for Multi-FPGA Systems. ACM Trans. Design Autom. Electr. Syst. 28(6): 104:1-104:10 (2023) - 2022
- [j11]Zigang Chen, Jin Ao, Wenjun Luo, Zhiquan Cheng, Yuhong Liu, Kai Sheng, Long Chen:
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection. J. Inf. Secur. Appl. 68: 103247 (2022) - [j10]Haichi Ma, Hongchao Ma, Liang Zhang, Ke Liu, Wenjun Luo:
Extracting Urban Road Footprints from Airborne LiDAR Point Clouds with PointNet++ and Two-Step Post-Processing. Remote. Sens. 14(3): 789 (2022) - [j9]Tianyu Liu, Xuehui Jiang, Wenjun Luo, Jianwei Yan:
Settlement of an Existing Tunnel Induced by Crossing Shield Tunneling Involving Residual Jacking Force. Symmetry 14(7): 1462 (2022) - 2021
- [j8]Xing Wei, Wenjun Luo:
2.5D singular boundary method for acoustic wave propagation. Appl. Math. Lett. 112: 106760 (2021) - [j7]Chunjing Yao, Hongchao Ma, Wenjun Luo, Haichi Ma:
A Precisely One-Step Registration Methodology for Optical Imagery and LiDAR Data Using Virtual Point Primitives. Remote. Sens. 13(23): 4836 (2021) - 2020
- [j6]Haichi Ma, Hongchao Ma, Ke Liu, Wenjun Luo, Liang Zhang:
Direct Georeferencing for the Images in an Airborne LiDAR System by Automatic Boresight Misalignments Calibration. Sensors 20(18): 5056 (2020) - [c11]Enmei Lai, Wenjun Luo:
Static Analysis of Integer Overflow of Smart Contracts in Ethereum. ICCSP 2020: 110-115
2010 – 2019
- 2019
- [j5]Yousheng Zhou, Xiaofeng Zhao, Siling Liu, Xingwang Long, Wenjun Luo:
A time-aware searchable encryption scheme for EHRs. Digit. Commun. Networks 5(3): 170-175 (2019) - 2018
- [j4]Chunlin He, Shuchao Li, Wenjun Luo, Liqun Sun:
Calculating the normalized Laplacian spectrum and the number of spanning trees of linear pentagonal chains. J. Comput. Appl. Math. 344: 381-393 (2018) - [c10]Zhong Hong, Fei Tang, Wenjun Luo:
Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks. ICCSP 2018: 72-76 - 2016
- [j3]Yousheng Zhou, Han Guo, Feng Wang, Wenjun Luo:
Multi-Key Searchable Encryption with Designated Server. Intell. Autom. Soft Comput. 22(2): 295-301 (2016) - 2015
- [c9]Wenjun Luo, Yaqiong Chen, Yousheng Zhou:
Dynamic Searchable Encryption with Multi-user Private Search for Cloud Computing. CIT/IUCC/DASC/PICom 2015: 176-182 - [c8]Jia Tian, Wei Hu, Chunqiang Li, Tianpei Li, Wenjun Luo:
Multi-thread Connection Based Scheduling Algorithm for Network on Chip. HPCC/CSS/ICESS 2015: 1473-1478 - 2014
- [j2]Wenjun Luo, Xiaoyan Lei:
Analysis of Dynamic Behavior for Ballastless Track-Bridge with a Hybrid Method. Intell. Autom. Soft Comput. 20(4): 487-500 (2014) - 2012
- [c7]Wenjun Luo, Jianming Tan:
Public key encryption with keyword search based on factoring. CCIS 2012: 1245-1247 - 2011
- [c6]Wenjun Luo, Guojing Bai:
Ensuring the data integrity in cloud data storage. CCIS 2011: 240-243
2000 – 2009
- 2007
- [c5]Tianhong Luo, Wenjun Luo, Zhaofeng Lu:
DFMA for Internet-Based Collaborative Design. CSCWD 2007: 226-232 - 2005
- [c4]Wenjun Luo, Arulsaravana Jeyaraj, Magda El Zarki:
Optimal resource allocation and leaky bucket based power control for CBR MIMO systems. IPCCC 2005: 561-566 - 2004
- [c3]Wenjun Luo, Xiang Li:
A study of secure multi-party elementary function computation protocols. InfoSecu 2004: 5-12
1990 – 1999
- 1999
- [c2]Wenjun Luo, Magda El Zarki:
Receiver-Initiated Resource Renegotiation for VBR Video Transport. ICIP (3) 1999: 105-109 - 1997
- [j1]Wenjun Luo, Magda El Zarki:
Quality Control for VBR Video over ATM Networks. IEEE J. Sel. Areas Commun. 15(6): 1029-1039 (1997) - 1995
- [c1]Wenjun Luo, Magda El Zarki:
Adaptive data partitioning for MPEG-2 video transmission over ATM based networks. ICIP 1995: 17-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint