default search action
Wentao Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Ying Liu, Zhiyuan Chen, Wentao Zhao, Tianhao Zhao, Tianyu Jia, Zhixuan Wang, Ru Huang, Le Ye, Yufei Ma:
Sparsity-Aware In-Memory Neuromorphic Computing Unit With Configurable Topology of Hybrid Spiking and Artificial Neural Network. IEEE Trans. Circuits Syst. I Regul. Pap. 71(6): 2660-2673 (2024) - [j41]Yufei Ma, Yikan Qiu, Wentao Zhao, Guoxiang Li, Meng Wu, Tianyu Jia, Le Ye, Ru Huang:
DCIM-GCN: Digital Computing-in-Memory Accelerator for Graph Convolutional Network. IEEE Trans. Circuits Syst. I Regul. Pap. 71(6): 2735-2748 (2024) - [j40]Jun-Jie Huang, Ziyue Wang, Tianrui Liu, Wenhan Luo, Zihan Chen, Wentao Zhao, Meng Wang:
DeMPAA: Deployable Multi-Mini-Patch Adversarial Attack for Remote Sensing Image Classification. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [c71]Meng Wu, Wenjie Ren, Peiyu Chen, Wentao Zhao, Yiqi Jing, Jiayoon Ru, Zhixuan Wang, Yufei Ma, Ru Huang, Tianyu Jia, Le Ye:
S2D-CIM: A 22nm 128Kb Systolic Digital Compute-in-Memory Macro with Domino Data Path for Flexible Vector Operation and 2-D Weight Update in Edge AI Applications. CICC 2024: 1-2 - [c70]Tianchen Deng, Guole Shen, Tong Qin, Jianyu Wang, Wentao Zhao, Jingchuan Wang, Danwei Wang, Weidong Chen:
PLGSLAM: Progressive Neural Scene Represenation with Local to Global Bundle Adjustment. CVPR 2024: 19657-19666 - [c69]Yanbo Wang, Wentao Zhao, Chuan Cao, Tianchen Deng, Jingchuan Wang, Weidong Chen:
SFPNet: Sparse Focal Point Network for Semantic Segmentation on General LiDAR Point Clouds. ECCV (5) 2024: 403-421 - [c68]Zihan Chen, Tianrui Liu, Jun-Jie Huang, Wentao Zhao, Xing Bi, Meng Wang:
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography. ICASSP 2024: 4520-4524 - [c67]Xiao Liu, Jun-Jie Huang, Wentao Zhao:
GCIA: A Black-Box Graph Injection Attack Method Via Graph Contrastive Learning. ICASSP 2024: 6570-6574 - [c66]Yi Pan, Jun-Jie Huang, Zihan Chen, Wentao Zhao, Ziyue Wang:
SVASTIN: Sparse Video Adversarial Attack via Spatio-Temporal Invertible Neural Networks. ICME 2024: 1-6 - [c65]Wentao Zhao, Qitian Wu, Chenxiao Yang, Junchi Yan:
GeoMix: Towards Geometry-Aware Data Augmentation. KDD 2024: 4500-4511 - [c64]Wentao Zhao, Takuya Otani, Sugiyama Soma, Mitani Kento, Koki Masaya, Atsuo Takanishi, Shuntaro Aotake, Masatoshi Funabashi, Jun Ohya:
Locating the Fruit to Be Harvested and Estimating Cut Positions from RGBD Images Acquired by a Camera Moved along Fixed Paths Using a Mask-R-CNN Based Method. RO-MAN 2024: 2189-2196 - [i13]Yi Pan, Jun-Jie Huang, Zihan Chen, Wentao Zhao, Ziyue Wang:
SVASTIN: Sparse Video Adversarial Attack via Spatio-Temporal Invertible Neural Networks. CoRR abs/2406.01894 (2024) - [i12]Wentao Zhao, Jiaming Chen, Ziyu Meng, Donghui Mao, Ran Song, Wei Zhang:
VLMPC: Vision-Language Model Predictive Control for Robotic Manipulation. CoRR abs/2407.09829 (2024) - [i11]Wentao Zhao, Qitian Wu, Chenxiao Yang, Junchi Yan:
GeoMix: Towards Geometry-Aware Data Augmentation. CoRR abs/2407.10681 (2024) - [i10]Yanbo Wang, Wentao Zhao, Chuan Cao, Tianchen Deng, Jingchuan Wang, Weidong Chen:
SFPNet: Sparse Focal Point Network for Semantic Segmentation on General LiDAR Point Clouds. CoRR abs/2407.11569 (2024) - 2023
- [j39]Wentao Zhao, Chao Zhang, Jianguo Wang, Shuai Wang, Da Lv, Feifan Qin:
Research on Digital Twin Driven Rolling Bearing Model-Data Fusion Life Prediction Method. IEEE Access 11: 48611-48627 (2023) - [j38]Wentao Zhao, Zhe Zhang, Zhao Wang, Yan Guo, Jun Xie, Xinying Xu:
ECLNet: Center localization of eye structures based on Adaptive Gaussian Ellipse Heatmap. Comput. Biol. Medicine 153: 106485 (2023) - [j37]Wentao Zhao, Yanbo Wang, Zehao Wang, Rui Li, Peng Xiao, Jingchuan Wang, Rui Guo:
Self-supervised deep monocular visual odometry and depth estimation with observation variation. Displays 80: 102553 (2023) - [j36]Xinyi Huang, Yuchuan Luo, Lin Liu, Wentao Zhao, Shaojing Fu:
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation. Inf. Sci. 637: 118943 (2023) - [j35]Wentao Zhao, Dasheng Wu, Xinyu Zheng:
Detection of Chrysanthemums Inflorescence Based on Improved CR-YOLOv5s Algorithm. Sensors 23(9): 4234 (2023) - [j34]Chao Zhang, Feifan Qin, Wentao Zhao, Jianjun Li, Tongtong Liu:
Research on Rolling Bearing Fault Diagnosis Based on Digital Twin Data and Improved ConvNext. Sensors 23(11): 5334 (2023) - [j33]Songming Yu, Yifan He, Hongyang Jia, Wenyu Sun, Mufeng Zhou, Luchang Lei, Wentao Zhao, Guofu Ma, Huazhong Yang, Yongpan Liu:
A Heterogeneous Microprocessor Based on All-Digital Compute-in-Memory for End-to-End AIoT Inference. IEEE Trans. Circuits Syst. II Express Briefs 70(8): 3099-3103 (2023) - [j32]Xia He, Qingsong Zhang, Jianming Ding, Wentao Zhao:
Wheelset-Bearing Fault Feature Extraction From Multi-Impulsive Signals Under Time-Varying Speed Conditions. IEEE Trans. Instrum. Meas. 72: 1-12 (2023) - [j31]Qingsong Zhang, Qingbin Zhai, Jianming Ding, Wentao Zhao, Xia He, Weiwei Liu:
An Efficient Method for Dynamic Measurement of Wheelset Geometric Parameters. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - [c63]Zihan Chen, Ziyue Wang, Jun-Jie Huang, Wentao Zhao, Xiao Liu, Dejian Guan:
Imperceptible Adversarial Attack via Invertible Neural Networks. AAAI 2023: 414-424 - [c62]Ziyue Wang, Jun-Jie Huang, Tianrui Liu, Zihan Chen, Wentao Zhao, Xiao Liu, Yi Pan, Lin Liu:
Multi-patch Adversarial Attack for Remote Sensing Image Classification. APWeb-WAIM (1) 2023: 377-391 - [c61]Ying Liu, Zhiyuan Chen, Zhixuan Wang, Wentao Zhao, Wei He, Jianfeng Zhu, Oijun Wang, Ning Zhang, Tianyu Jia, Yufei Ma, Le Ye, Ru Huang:
A A 22nm 0.43pJ/SOP Sparsity-Aware In-Memory Neuromorphic Computing System with Hybrid Spiking and Artificial Neural Network and Configurable Topology. CICC 2023: 1-2 - [c60]Pei Zhang, Xinwang Liu, Jian Xiong, Sihang Zhou, Wentao Zhao, En Zhu, Zhiping Cai:
Consensus One-step Multi-view Subspace Clustering (Extended abstract). ICDE 2023: 3761-3762 - [c59]Qitian Wu, Chenxiao Yang, Wentao Zhao, Yixuan He, David Wipf, Junchi Yan:
DIFFormer: Scalable (Graph) Transformers Induced by Energy Constrained Diffusion. ICLR 2023 - [c58]Yiqi Jing, Yiyang Sun, Xiao Wang, Wentao Zhao, Meng Wu, Fengyun Yan, Yufei Ma, Le Ye, Tianyu Jia:
DCIM-3DRec: A 3D Reconstruction Accelerator with Digital Computing-in-Memory and Octree-Based Scheduler. ISLPED 2023: 1-6 - [c57]Peiyu Chen, Meng Wu, Wentao Zhao, Jiajia Cui, Zhixuan Wang, Yadong Zhang, Qijun Wang, Jiayoon Ru, Linxiao Shen, Tianyu Jia, Yufei Ma, Le Ye, Ru Huang:
A 22nm Delta-Sigma Computing-In-Memory (Δ∑CIM) SRAM Macro with Near-Zero-Mean Outputs and LSB-First ADCs Achieving 21.38TOPS/W for 8b-MAC Edge AI Processing. ISSCC 2023: 140-141 - [c56]Wentao Zhao, Qitian Wu, Chenxiao Yang, Junchi Yan:
GraphGLOW: Universal and Generalizable Structure Learning for Graph Neural Networks. KDD 2023: 3525-3536 - [c55]Qitian Wu, Wentao Zhao, Chenxiao Yang, Hengrui Zhang, Fan Nie, Haitian Jiang, Yatao Bian, Junchi Yan:
Simplifying and Empowering Transformers for Large-Graph Representations. NeurIPS 2023 - [i9]Qitian Wu, Chenxiao Yang, Wentao Zhao, Yixuan He, David Wipf, Junchi Yan:
DIFFormer: Scalable (Graph) Transformers Induced by Energy Constrained Diffusion. CoRR abs/2301.09474 (2023) - [i8]Qitian Wu, Wentao Zhao, Zenan Li, David Wipf, Junchi Yan:
NodeFormer: A Scalable Graph Structure Learning Transformer for Node Classification. CoRR abs/2306.08385 (2023) - [i7]Qitian Wu, Wentao Zhao, Chenxiao Yang, Hengrui Zhang, Fan Nie, Haitian Jiang, Yatao Bian, Junchi Yan:
Simplifying and Empowering Transformers for Large-Graph Representations. CoRR abs/2306.10759 (2023) - [i6]Wentao Zhao, Qitian Wu, Chenxiao Yang, Junchi Yan:
GraphGLOW: Universal and Generalizable Structure Learning for Graph Neural Networks. CoRR abs/2306.11264 (2023) - [i5]Zihan Chen, Tianrui Liu, Jun-Jie Huang, Wentao Zhao, Xing Bi, Meng Wang:
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography. CoRR abs/2309.08987 (2023) - [i4]Tianchen Deng, Guole Shen, Tong Qin, Jianyu Wang, Wentao Zhao, Jingchuan Wang, Danwei Wang, Weidong Chen:
PLGSLAM: Progressive Neural Scene Represenation with Local to Global Bundle Adjustment. CoRR abs/2312.09866 (2023) - 2022
- [j30]Jiacai Yi, Chengkun Wu, Xiao-Chen Zhang, Xinyi Xiao, Yanlong Qiu, Wentao Zhao, Tingjun Hou, Dong-Sheng Cao:
MICER: a pre-trained encoder-decoder architecture for molecular image captioning. Bioinform. 38(19): 4562-4572 (2022) - [j29]Wentao Zhao, Huanhuan Tian, Yan Wu, Ziheng Cui, Tingting Feng:
A New Item-Based Collaborative Filtering Algorithm to Improve the Accuracy of Prediction in Sparse Data. Int. J. Comput. Intell. Syst. 15(1): 15 (2022) - [j28]Qingsong Zhang, Jianming Ding, Wentao Zhao:
An Adaptive Demodulation Band Segmentation Method to Optimize Spectral Boundary and Its Application for Wheelset-Bearing Fault Detection. IEEE Trans. Instrum. Meas. 71: 1-10 (2022) - [j27]Pei Zhang, Xinwang Liu, Jian Xiong, Sihang Zhou, Wentao Zhao, En Zhu, Zhiping Cai:
Consensus One-Step Multi-View Subspace Clustering. IEEE Trans. Knowl. Data Eng. 34(10): 4676-4689 (2022) - [j26]Yuyang Zhang, Wentao Zhao, Ping Dong, Xiaojiang Du, Wenxuan Qiao, Mohsen Guizani:
Improve the reliability of 6G vehicular communication through skip network coding. Veh. Commun. 33: 100400 (2022) - [c54]Yikan Qiu, Yufei Ma, Wentao Zhao, Meng Wu, Le Ye, Ru Huang:
DCIM-GCN: Digital Computing-in-Memory to Efficiently Accelerate Graph Convolutional Networks. ICCAD 2022: 46:1-46:9 - [c53]Qitian Wu, Wentao Zhao, Zenan Li, David P. Wipf, Junchi Yan:
NodeFormer: A Scalable Graph Structure Learning Transformer for Node Classification. NeurIPS 2022 - [c52]Yuhui Xie, Wentao Zhao, Jiahao Wang, Jingchuan Wang, Weidong Chen:
Precise LiDAR SLAM in Structured Scene Using Finite Plane and Prior Constraint. ROBIO 2022: 584-589 - [i3]Zihan Chen, Ziyue Wang, Junjie Huang, Wentao Zhao, Xiao Liu, Dejian Guan:
Imperceptible Adversarial Attack via Invertible Neural Networks. CoRR abs/2211.15030 (2022) - 2021
- [j25]Wentao Zhao, Dalin Zhou, Xinguo Qiu, Wei Jiang:
How to Represent Paintings: A Painting Classification Using Artistic Comments. Sensors 21(6): 1940 (2021) - [c51]Qiang Liu, Wentao Zhao, Ruijin Wang, Jiangyong Shi:
A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application. ACM TUR-C 2021: 54-60 - [c50]Min Guo, Weiwei Xing, Di Zhang, Wentao Zhao, Shuzhong Yang:
Online Auction Based Resource Allocation for Soft-Deadline Tasks in Edge Computing. GLOBECOM 2021: 1-6 - [c49]Lijie Chen, Shaojing Fu, Lin Liu, Yuchuan Luo, Wentao Zhao:
Privacy-Preserving Swarm Learning Based on Homomorphic Encryption. ICA3PP (3) 2021: 509-523 - [c48]Kaifei Zhao, Wentao Zhao, Jun Xie, Binrong Li, Zhe Zhang, Xinying Xu:
Generative Adversarial Networks and Improved Efficientnet for Imbalanced Diabetic Retinopathy Grading. ICCSIP 2021: 345-359 - [c47]Luming Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao:
A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance. MSN 2021: 1-8 - 2020
- [j24]Wentao Zhao, Xiao Liu, Qiang Liu, Jiuren Chen, Pan Li:
Model Capacity Vulnerability in Hyper-Parameters Estimation. IEEE Access 8: 21602-21612 (2020) - [j23]Ye Peng, Wentao Zhao, Wei Cai, Jinshu Su, Biao Han, Qiang Liu:
Evaluating Deep Learning for Image Classification in Adversarial Environment. IEICE Trans. Inf. Syst. 103-D(4): 825-837 (2020) - [j22]Yan Li, Jiahong Guo, Xiaomin Guo, Kaizhou Liu, Wentao Zhao, Yeteng Luo, Zhenyu Wang:
A Novel Target Detection Method of the Unmanned Surface Vehicle under All-Weather Conditions with an Improved YOLOV3. Sensors 20(17): 4885 (2020) - [j21]Wentao Zhao, Ping Dong, Min Guo, Yuyang Zhang, Xuehong Chen:
BSS: A Burst Error-Correction Scheme of Multipath Transmission for Mobile Fog Computing. Wirel. Commun. Mob. Comput. 2020: 8846545:1-8846545:10 (2020) - [c46]Pu Zhao, Wentao Zhao, Qiang Liu:
Research on SDN Enabled by Machine Learning: An Overview. 6GN 2020: 190-203 - [c45]Qiang Liu, Wentao Zhao, Minghui Wu, Chengzhang Zhu:
Web Security Education in A Multidisciplinary Learning Context. ACM TUR-C 2020: 1-7 - [c44]Dan Liu, Weixuan Liang, Hongya Zhang, Wentao Zhao, Kaifan Hu:
Late Fusion Multi-view Clustering with Learned Consensus Similarity Matrix. NCTCS 2020: 73-86 - [c43]Rongkun Zhang, Dan Liu, Wentao Zhao, Qiang Liu, Chengzhang Zhu:
A Simple yet Effective Unsupervised Adversarial Example Generation Framework for Vulnerability Assessment on Deep Learning. NCTCS 2020: 107-122 - [c42]Pu Zhao, Wentao Zhao, Qiang Liu, Anbang Wang:
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. SPDE 2020: 19-32 - [i2]Wentao Zhao, Dalin Zhou, Xinguo Qiu, Wei Jiang:
A pipeline for fair comparison of graph neural networks in node classification tasks. CoRR abs/2012.10619 (2020)
2010 – 2019
- 2019
- [c41]Qian Li, Qiang Wu, Chengzhang Zhu, Jian Zhang, Wentao Zhao:
An Inferable Representation Learning for Fraud Review Detection with Cold-start Problem. IJCNN 2019: 1-8 - [c40]Pu Zhao, Wentao Zhao, Qiang Liu:
Multi-objective Link-Separation Multipath Selection Using k Max-Min for Software-Defined MANETs. MSN 2019: 253-258 - [c39]Qiaobo Da, Jieren Cheng, Qian Li, Wentao Zhao:
Socially-Attentive Representation Learning for Cold-Start Fraud Review Detection. NCTCS 2019: 76-91 - [c38]Qian Li, Qiang Wu, Chengzhang Zhu, Jian Zhang, Wentao Zhao:
Unsupervised User Behavior Representation for Fraud Review Detection with Cold-Start Problem. PAKDD (1) 2019: 222-236 - 2018
- [j20]Qiang Liu, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, Victor C. M. Leung:
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE Access 6: 12103-12117 (2018) - [j19]Wentao Zhao, Pan Li, Qiang Liu, Dan Liu, Xinwang Liu:
Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning. KSII Trans. Internet Inf. Syst. 12(12): 5765-5781 (2018) - [j18]Wentao Zhao, Qian Li, Chengzhang Zhu, Jianglong Song, Xinwang Liu, Jianping Yin:
Model-aware categorical data embedding: a data-driven approach. Soft Comput. 22(11): 3603-3619 (2018) - [c37]Qiang Liu, Jiao Ji, Juan Chen, Wentao Zhao, Jianping Yin:
Evaluating the effectiveness of situational case-based teaching: a view of concept mapping. TURC 2018: 60-66 - [c36]Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang:
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection. ICC 2018: 1-7 - [c35]Pan Li, Wentao Zhao, Qiang Liu, Xiao Liu, Linyuan Yu:
Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model. WASA 2018: 261-273 - [i1]Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang:
BEBP: An Poisoning Method Against Machine Learning Based IDSs. CoRR abs/1803.03965 (2018) - 2017
- [j17]Siqi Wang, Qiang Liu, En Zhu, Jianping Yin, Wentao Zhao:
MST-GEN: An Efficient Parameter Selection Method for One-Class Extreme Learning Machine. IEEE Trans. Cybern. 47(10): 3266-3279 (2017) - [j16]Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu:
Approximation Algorithms for Cell Planning in Heterogeneous Networks. IEEE Trans. Veh. Technol. 66(2): 1561-1572 (2017) - [c34]Qiang Liu, Wentao Zhao, Dan Liu, Jiao Ji:
Evaluation of situational case-based teaching technique in engineering education. ACM TUR-C 2017: 11:1-11:7 - [c33]Guansong Pang, Hongzuo Xu, Longbing Cao, Wentao Zhao:
Selective Value Coupling Learning for Detecting Outliers in High-Dimensional Categorical Data. CIKM 2017: 807-816 - [c32]Jianglong Song, Chengzhang Zhu, Wentao Zhao, Wenjie Liu, Qiang Liu:
Model-Aware Representation Learning for Categorical Data with Hierarchical Couplings. ICANN (2) 2017: 242-249 - [c31]Yan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang:
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing. ICCCS (2) 2017: 684-693 - [c30]Dongxu Wang, Qiang Liu, Huikang Yi, Han Han, Wentao Zhao, Tiejun Wu:
A Practical Data Forwarding Path Selecting Method for Software-Defined 5G Networking. WCNC 2017: 1-6 - 2016
- [j15]Wentao Zhao, Shaowei Wang:
Traffic Density-Based RRH Selection for Power Saving in C-RAN. IEEE J. Sel. Areas Commun. 34(12): 3157-3167 (2016) - [c29]Runxiao Wang, Wentao Zhao, Shujun Li, Shunqi Zhang:
Influence of leg stiffness on payload capacity at high speed. ROBIO 2016: 1005-1010 - [c28]Wentao Zhao, Shaowei Wang:
Remote Radio Head Selection for Power Saving in Cloud Radio Access Networks. VTC Spring 2016: 1-5 - 2015
- [j14]Wentao Zhao, Shaowei Wang:
Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks: An Alternating Optimization Method. IEEE Commun. Lett. 19(8): 1398-1401 (2015) - [j13]Lingjun Meng, Wentao Zhao, Haohao Zhao, Yang Ding:
A Network Load Sensitive Block Placement Strategy of HDFS. KSII Trans. Internet Inf. Syst. 9(9): 3539-3558 (2015) - [j12]Wentao Zhao, Shaowei Wang:
Resource Sharing Scheme for Device-to-Device Communication Underlaying Cellular Networks. IEEE Trans. Commun. 63(12): 4838-4848 (2015) - [j11]Shaowei Wang, Wentao Zhao, Chonggang Wang:
Budgeted Cell Planning for Cellular Networks With Small Cells. IEEE Trans. Veh. Technol. 64(10): 4797-4806 (2015) - [c27]Wentao Zhao, Shaowei Wang, Jinghong Guo:
Efficient resource allocation for OFDMA-based device-to-device communication underlaying cellular networks. ICCC 2015: 1-6 - [c26]Wentao Zhao, Runxiao Wang, Xiaoyu Zhang, Xiong Wang:
Influence of biological joint stiffness on running stability. ROBIO 2015: 547-552 - [c25]Qiang Liu, Chengzhang Zhu, Xiping Hu, Wentao Zhao:
CIS: Community-based information sharing mechanism for automotive IoT. WF-IoT 2015: 138-142 - 2014
- [j10]Wentao Zhao, Shaowei Wang:
Joint subchannel and power allocation in multiuser OFDM systems with minimal rate constraints. Int. J. Commun. Syst. 27(1): 1-12 (2014) - [c24]Yuanyuan Liu, Wentao Zhao, Lu Zhu, Baishan Ci, Suhua Chen:
The Method of Data Aggregation for Wireless Sensor Networks Based on LEACH-CS. CWSN 2014: 489-498 - [c23]Wentao Zhao, Shaowei Wang:
Low complexity power allocation for device-to-device communication underlaying cellular networks. ICC 2014: 5532-5537 - [c22]Wentao Zhao, Jiancheng Yu, Aiqun Zhang, Yan Li:
Optimal Sensors Deployment for Tracking Level Curve Based on Posterior Cramér-Rao Lower Bound in Scalar Field. ICIRA (1) 2014: 129-141 - [c21]Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu:
Cell planning for heterogeneous networks: An approximation algorithm. INFOCOM 2014: 1087-1095 - 2013
- [j9]Shaowei Wang, Mengyao Ge, Wentao Zhao:
Energy-Efficient Resource Allocation for OFDM-Based Cognitive Radio Networks. IEEE Trans. Commun. 61(8): 3181-3191 (2013) - [c20]Kai Guo, Wentao Zhao, Yingchun Lei, Yili Gong:
I/O scheduling for solid state devices in virtual machines. CLUSTER 2013: 1-6 - [c19]Wentao Zhao, Shaowei Wang:
Cell planning for heterogeneous cellular networks. WCNC 2013: 1032-1037 - [c18]Shaowei Wang, Wentao Zhao, Chonggang Wang:
Approximation algorithms for cellular networks planning with relay nodes. WCNC 2013: 3230-3235 - 2012
- [c17]Wentao Zhao, Jun Long, Jianping Yin, Zhiping Cai, Ge-Ming Xia:
Sampling Attack against Active Learning in Adversarial Environment. MDAI 2012: 222-233 - [c16]Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. WISA 2012: 43-54 - 2011
- [j8]Jun Long, Wentao Zhao, Fangzhou Zhu, Zhiping Cai:
Active Learning to Defend Poisoning Attack against Semi-Supervised Intrusion Detection Classifier. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(Supplement-1): 93-106 (2011) - [c15]Zimei Peng, Wentao Zhao, Jun Long:
Grey Synthetic Clustering Method for DoS Attack Effectiveness Evaluation. MDAI 2011: 139-149 - 2010
- [c14]Fangzhou Zhu, Jun Long, Wentao Zhao, Zhiping Cai:
A Misleading Attack against Semi-supervised Learning for Intrusion Detection. MDAI 2010: 287-298
2000 – 2009
- 2009
- [b1]Wentao Zhao:
Genomic applications of statistical signal processing. Texas A&M University, College Station, USA, 2009 - [j7]Wentao Zhao, Erchin Serpedin, Edward R. Dougherty:
Spectral Preprocessing for Clustering Time-Series Gene Expressions. EURASIP J. Bioinform. Syst. Biol. 2009 (2009) - [j6]Wentao Zhao, Erchin Serpedin, Edward R. Dougherty:
Identifying Genes Involved in Cyclic Processes by Combining Gene Expression Analysis and Prior Knowledge. EURASIP J. Bioinform. Syst. Biol. 2009 (2009) - 2008
- [j5]Wentao Zhao, Kwadwo Agyepong, Erchin Serpedin, Edward R. Dougherty:
Detecting Periodic Genes from Irregularly Sampled Gene Expressions: A Comparison Study. EURASIP J. Bioinform. Syst. Biol. 2008 (2008) - [j4]Wentao Zhao, Erchin Serpedin, Edward R. Dougherty:
Recovering Genetic Regulatory Networks from Chromatin Immunoprecipitation and Steady-State Microarray Data. EURASIP J. Bioinform. Syst. Biol. 2008 (2008) - [j3]Jun Long, Jianping Yin, En Zhu, Wentao Zhao:
Active Learning with Misclassification Sampling Based on Committee. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 16(Supplement-1): 55-70 (2008) - [j2]Wentao Zhao, Erchin Serpedin, Edward R. Dougherty:
Inferring Connectivity of Genetic Regulatory Networks Using Information-Theoretic Criteria. IEEE ACM Trans. Comput. Biol. Bioinform. 5(2): 262-274 (2008) - [c13]Wentao Zhao, Jun Long, En Zhu, Yun Liu:
A Scalable Algorithm for Graph-Based Active Learning. FAW 2008: 311-322 - [c12]Wentao Zhao, Kwadwo Agyepong, Erchin Serpedin, Edward R. Dougherty:
Identifying drosophila cell-cycle regulated genes from irregular microarray data. ICASSP 2008: 633-636 - [c11]Jun Long, Jianping Yin, Wentao Zhao, En Zhu:
Graph-Based Active Learning Based on Label Propagation. MDAI 2008: 179-190 - [c10]Jun Long, Jianping Yin, En Zhu, Wentao Zhao:
Active Learning with Misclassification Sampling Using Diverse Ensembles Enhanced by Unlabeled Instances. PAKDD 2008: 951-957 - [c9]Wentao Zhao, Jianping Yin, Jun Long:
A Prediction Model of DoS Attack's Distribution Discrete Probability. WAIM 2008: 625-628 - 2007
- [c8]Wentao Zhao, Tao Fang, Yan Jiang:
Data Fusion Using Improved Dempster-Shafer Evidence Theory for Vehicle Detection. FSKD (1) 2007: 487-491 - [c7]Wentao Zhao, Kwadwo Agyepong, Erchin Serpedin, Edward R. Dougherty:
Reconstruction of Genetic Regulatory Networks Based on the Posterior Probabilities of Gene Regulations. ICASSP (1) 2007: 257-360 - [c6]Yan Jiang, Weiqin Tong, Wentao Zhao:
Resource Load Balancing Based on Multi-agent in ServiceBSP Model. International Conference on Computational Science (3) 2007: 42-49 - [c5]Lining Xing, Wentao Zhao:
Dynamic Structure-Based Neural Network Determination Using Orthogonal Genetic Algorithm with Quantization. LSMS (1) 2007: 162-171 - 2006
- [j1]Wentao Zhao, Erchin Serpedin, Edward R. Dougherty:
Inferring gene regulatory networks from time series data using the minimum description length principle. Bioinform. 22(17): 2129-2135 (2006) - 2005
- [c4]Jianping Yin, Zhiping Cai, Wentao Zhao, Xianghui Liu:
Passive Calibration of Active Measuring Latency. ICN (2) 2005: 746-753 - [c3]Zhiping Cai, Wentao Zhao, Jianping Yin, Xianghui Liu:
Using Passive Measuring to Calibrate Active Measuring Latency. ICOIN 2005: 198-206 - [c2]Wentao Zhao:
Simplifying the power allocation for OFDM-MIMO: a partial curve fitting approach. IPCCC 2005: 573-578 - 2004
- [c1]Wentao Zhao, Mi Lu:
CDMA Downlink Rate Allocation for Heterogeneous Traffic Based on Utility Function: GA-SA Approach. CNSR 2004: 156-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-29 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint