default search action
Yingyou Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Wang Chen, Liu Yan-yi, Tiezheng Guo, Li Da-peng, He Tao, Li Zhi, Qingwen Yang, Wang Hui-han, Yingyou Wen:
Systems engineering issues for industry applications of large language model. Appl. Soft Comput. 151: 111165 (2024) - [j22]Shiyao Sun, Chong Fu, Sen Xu, Yingyou Wen, Tao Ma:
GLFNet: Global-local fusion network for the segmentation in ultrasound images. Comput. Biol. Medicine 171: 108103 (2024) - [i2]Tiezheng Guo, Chen Wang, Yanyi Liu, Jiawei Tang, Pan Li, Sai Xu, Qingwen Yang, Xianlin Gao, Zhi Li, Yingyou Wen:
Leveraging Inter-Chunk Interactions for Enhanced Retrieval in Large Language Model-Based Question Answering. CoRR abs/2408.02907 (2024) - 2023
- [j21]Nan Li, Lianbo Ma, TieJun Xing, Guo Yu, Chen Wang, Yingyou Wen, Shi Cheng, Shangce Gao:
Automatic design of machine learning via evolutionary computation: A survey. Appl. Soft Comput. 143: 110412 (2023) - [j20]Xiaoyi Fang, Jun-ling Shi, Yingyou Wen, Zhaoyu Yang, Xinran Zhang:
Information-centric vehicular social network routing scheme in smart city. Internet Technol. Lett. 6(2) (2023) - [c25]Xiaojie An, Lianbo Ma, Yuee Zhou, Nan Li, TieJun Xing, Yingyou Wen, Chang Liu, Haibo Shi:
Neural Architecture Search Based on Improved Brain Storm Optimization Algorithm. ICSI (1) 2023: 334-344 - [c24]Yang Liu, TieJun Xing, Yuee Zhou, Nan Li, Lianbo Ma, Yingyou Wen, Chang Liu, Haibo Shi:
A Large-Scale Multi-objective Brain Storm Optimization Algorithm Based on Direction Vectors and Variance Analysis. ICSI (1) 2023: 413-424 - [i1]Tiezheng Guo, Qingwen Yang, Chen Wang, Yanyi Liu, Pan Li, Jiawei Tang, Dapeng Li, Yingyou Wen:
KnowledgeNavigator: Leveraging Large Language Models for Enhanced Reasoning over Knowledge Graph. CoRR abs/2312.15880 (2023) - 2022
- [j19]Haoran Zhao, Tao Ren, Chen Wang, Xiaotao Yang, Yingyou Wen:
Multi-context unsupervised domain adaption for HEp-2 cell classification using maximum partial classifier discrepancy. J. Supercomput. 78(12): 14362-14380 (2022) - [c23]Chen Wang, Tao He, Jiansheng Liu, Dapeng Li, Yingyou Wen:
A HEp-2 Cell Image Classification Model Based on Deep Residual Shrinkage Network Combined with Dilated Convolution. Intelligent Information Processing 2022: 409-418
2010 – 2019
- 2019
- [j18]Quyuan Luo, Changle Li, Tom H. Luan, Yingyou Wen:
Optimal Utility of Vehicles in LTE-V Scenario: An Immune Clone-Based Spectrum Allocation Approach. IEEE Trans. Intell. Transp. Syst. 20(5): 1942-1953 (2019) - [j17]Xiaotao Yang, Yingyou Wen, Duoning Yuan, Mingyang Zhang, Hong Zhao, Yinghui Meng:
Coverage Degree-Coverage Model in Wireless Visual Sensor Networks. IEEE Wirel. Commun. Lett. 8(3): 817-820 (2019) - 2018
- [j16]Mingyang Zhang, Yingyou Wen, Jian Chen, Xiaotao Yang, Rui Gao, Hong Zhao:
Pedestrian Dead-Reckoning Indoor Localization Based on OS-ELM. IEEE Access 6: 6116-6129 (2018) - [j15]Hua Wang, Yingyou Wen, Dazhe Zhao:
Identifying localization attacks in wireless sensor networks using deep learning. J. Intell. Fuzzy Syst. 35(2): 1339-1351 (2018) - 2017
- [j14]Xiaoshi Song, Yuting Geng, Xiangbo Meng, Jun Liu, Weimin Lei, Yingyou Wen:
Cache-Enabled Device to Device Networks With Contention-Based Multimedia Delivery. IEEE Access 5: 3228-3239 (2017) - [j13]Yingyou Wen, Zhi Li, Shuyuan Jin, Chuan Lin, Zheng Liu:
Energy-Efficient Virtual Resource Dynamic Integration Method in Cloud Computing. IEEE Access 5: 12214-12223 (2017) - [j12]Hua Wang, Yingyou Wen, Dazhe Zhao:
Robust positioning algorithm based on relative location map for mobile wireless sensor networks. J. Intell. Fuzzy Syst. 32(5): 3695-3710 (2017) - [c22]Xiaotao Yang, Yingyou Wen, Mingyang Zhang, Hong Zhao:
3D visual correlation model for wireless visual sensor networks. ICIS 2017: 75-80 - 2016
- [j11]Yingyou Wen, Zhi Li, Yinghui Meng, Tongjie Zhang:
A Novel Greedy Optimization Localization Algorithm for Wireless Sensor Networks in a Concave Area. Ad Hoc Sens. Wirel. Networks 31(1-4): 279-302 (2016) - [j10]Yingyou Wen, Rui Gao, Hong Zhao:
Energy Efficient Moving Target Tracking in Wireless Sensor Networks. Sensors 16(1): 29 (2016) - 2015
- [j9]Yingyou Wen, Zhi Li, Yinghui Meng, Dazhe Zhao:
A Two-Stage Range-Free Localization Method for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 908417:1-908417:12 (2015) - [j8]Rui Gao, Yingyou Wen, Hong Zhao:
Secure Data Fusion in Wireless Multimedia Sensor Networks via Compressed Sensing. J. Sensors 2015: 636297:1-636297:7 (2015) - [j7]Jian Chen, Jie Jia, Enliang Dai, Yingyou Wen, Dazhe Zhao:
Bicriteria Optimization in Wireless Sensor Networks: Link Scheduling and Energy Consumption. J. Sensors 2015: 724628:1-724628:11 (2015) - [c21]Shaopeng Wang, Yingyou Wen, Hong Zhao:
Study on the Similarity Query Based on LCSS over Data Stream Window. ICEBE 2015: 68-73 - 2014
- [j6]Jian Chen, Jie Jia, Yingyou Wen, Dazhe Zhao:
Distributed Movement Control for Building a Ring in Mobile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j5]Rui Gao, Yingyou Wen, Hong Zhao, Yinghui Meng:
Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching. Int. J. Distributed Sens. Networks 10 (2014) - [c20]Zhi Li, Yingyou Wen, Yinghui Meng, Hong Zhao:
A Localization Algorithm for Wireless Sensor Networks. ICoC 2014: 56-67 - 2013
- [j4]Yingyou Wen, Zhi Li:
A service-integrated sensor network middleware applied to industrial solutions of IoT related. Telecommun. Syst. 53(1): 61-68 (2013) - [c19]Yingyou Wen, Zhi Li, Jian Chen, Hong Zhao:
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet. ICoC 2013: 1-8 - [c18]Yingyou Wen, Shaopeng Wang, Hong Zhao, Tongjie Zhang:
A Determination Algorithm for Probability Density about Uncertain Data Streams Based on GMM. MSN 2013: 84-88 - [c17]Zhi Li, Dazhe Zhao, Yingyou Wen, Yongzhong Mu:
Design of an OSGi-Based WSN Gateway. MSN 2013: 395-398 - 2011
- [j3]Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao:
Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing. J. Networks 6(4): 615-622 (2011) - [j2]Xuena Peng, Yingyou Wen, Hong Zhao:
Security Issues and Solutions in 3G Core Network. J. Networks 6(5): 823-830 (2011) - [c16]Yingyou Wen, Zhi Li, Xuena Peng, Hong Zhao:
A Middleware Architecture for Sensor Networks Applied to Industry Solutions of Internet of Things. ICDMA 2011: 50-54 - [c15]Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao:
The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network. TrustCom 2011: 1733-1738 - 2010
- [c14]Jian Chen, Jie Jia, Yingyou Wen, Dazhe Zhao, Jiren Liu:
Efficient link scheduling for TDMA based WMN using multi-objective genetic algorithm. BIC-TA 2010: 923-927 - [c13]Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao:
A Sheme of Mobile Platform Based on Trusted Computing. CIS 2010: 465-468 - [c12]Xuena Peng, Yingyou Wen, Hong Zhao:
Securing GPRS Tunnel Protocol in 3G Core Network. CIS 2010: 469-473
2000 – 2009
- 2009
- [j1]Jie Jia, Jian Chen, Guiran Chang, Yingyou Wen, Jingping Song:
Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius. Comput. Math. Appl. 57(11-12): 1767-1775 (2009) - [c11]Jian Chen, Jie Jia, Yingyou Wen, Dazhe Zhao, Jiren Liu:
A genetic approach to channel assignment for multi-radio multi-channel wireless mesh networks. GEC Summit 2009: 39-46 - [c10]Jian Chen, Jie Jia, Yingyou Wen, Dazhe Zhao, Jiren Liu:
Modeling and extending lifetime of wireless sensor networks using genetic algorithm. GEC Summit 2009: 47-54 - [c9]Jian Chen, Jie Jia, Yingyou Wen, Dazhe Zhao, Jiren Liu:
Optimization of Resource Allocation in Multi-radio Multi-channel Wireless Mesh Networks. HIS (2) 2009: 240-244 - [c8]Bo Zhao, Yingyou Wen, Hong Zhao:
KDSR: An Efficient DHT-Based Routing Protocol for Mobile Ad Hoc Networks. HIS (2) 2009: 245-249 - 2008
- [c7]Guangyu He, Yingyou Wen, Hong Zhao:
SPIT Detection and Prevention Method in VoIP Environment. ARES 2008: 473-478 - [c6]Ming Luo, Yingyou Wen, Hong Zhao:
An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. ICYCS 2008: 1577-1582 - [c5]Ming Luo, Yingyou Wen, Hong Zhao:
A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks. NPC Workshops 2008: 3-10 - 2007
- [c4]Shuyi Chen, Yingyou Wen, Hong Zhao:
Formal Analysis of Secure Bootstrap in Trusted Computing. ATC 2007: 352-360 - [c3]Hanxun Zhou, Yingyou Wen, Hong Zhao:
Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. ICN 2007: 65 - [c2]Hanxun Zhou, Yingyou Wen, Hong Zhao:
Detecting early worm propagation based on entropy. Infoscale 2007: 71 - 2004
- [c1]Jianli Zhao, Yingyou Wen, Ruiqiang Shang, Guangxing Wang:
Optimizing Sensor Node Distribution with Genetic Algorithm in Wireless Sensor Network. ISNN (2) 2004: 242-247
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint