Bin Wen

Orcid: 0000-0002-3665-4730

According to our database1, Bin Wen authored at least 63 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Model Based on Deep Learning Approach Combining Data Decomposition Technique and Grouping Distribution Strategy for Water Demand Forecasting of Urban Users.
J. Circuits Syst. Comput., January, 2024

Research on image recognition of ethnic minority clothing based on improved vision transformer.
Math. Found. Comput., 2024

An AUTOSAR Crypto Stack System for Supporting Automotive Electronic Information Security.
Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence, 2024

2023
Task-oriented contrastive learning for unsupervised domain adaptation.
Expert Syst. Appl., November, 2023

A YANG Data Model for Network and VPN Service Performance Monitoring.
RFC, April, 2023

Improving insulator fault detection with effective-YOLOv7 network.
J. Electronic Imaging, 2023

Recognize Any Regions.
CoRR, 2023

Network Site Optimization and Clustering Study Based on Simulated Annealing Algorithm.
IEEE Access, 2023

Class-Incremental Learning Based on Big Dataset Pre-Trained Models.
IEEE Access, 2023

Improved Leaf Segmentation Method for UNet Feature Encoding.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

Research on Named Entity Recognition of Laboratory Safety Knowledge based on Deep Learning.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Contrastive Domain Adaptation Via Delimitation Discriminator.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
One-stage self-distillation guided knowledge transfer for long-tailed visual recognition.
Int. J. Intell. Syst., December, 2022

Analysis of the Correlation between the Mental Stress of College Students and Their Learning Initiative during the Outbreak of COVID-19.
Int. J. Emerg. Technol. Learn., December, 2022

Feature back-projection guided residual refinement for real-time stereo matching network.
Signal Process. Image Commun., 2022

RACP: A network with attention corrected prototype for few-shot speaker recognition using indefinite distance metric.
Neurocomputing, 2022

Self-supervised Video Representation Learning with Motion-Aware Masked Autoencoders.
CoRR, 2022

MetaFormer: A Unified Meta Framework for Fine-Grained Recognition.
CoRR, 2022

Research Status, Hot Spots and Enlightenment of College Students' Information Literacy: Based on Bibliometric Analysis of CNKI from 2000 to 2021.
Proceedings of the 4th World Symposium on Software Engineering, 2022

An Evolution Algorithm Based on Cloud Model for 0-1 Knapsack Problem.
Proceedings of the 15th International Symposium on Computational Intelligence and Design, 2022

Generic O-LLVM Automatic Multi-architecture Deobfuscation Framework Based on Symbolic Execution.
Proceedings of the 4th International Conference on Advanced Information Science and System, 2022

2021
Path Computation Element Communication Protocol (PCEP) Extensions for Associated Bidirectional Label Switched Paths (LSPs).
RFC, June, 2021

Explaining the semantics capturing capability of scene graph generation models.
Pattern Recognit., 2021

Research on human gait prediction and recognition algorithm of lower limb-assisted exoskeleton robot.
Intell. Serv. Robotics, 2021

An automatic coloring method for ethnic costume sketches based on generative adversarial networks.
Appl. Soft Comput., 2021

Recognize Illegal Transactions in the Bitcoin Network Using Graph Attention with DIKW.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

M-A-R: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Exploiting the Medical Data Storage Implementation and Privacy Protection with Consortium Blockchain and IPFS.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Unbiased Scene Graph Generation via Rich and Fair Semantic Extraction.
CoRR, 2020

Coordinating a dual-channel supply chain with conditional value-at-risk under uncertainties of yield and demand.
Comput. Ind. Eng., 2020

Product Consistency Joint Detection Algorithm Based on Deep Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Research on Image Recognition Method of Ethnic Costume Based on VGG.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Construction of Word Segmentation Model Based on HMM + BI-LSTM.
Proceedings of the Data Science, 2020

Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approach.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Eddy Current Sensor System for Blade Tip Clearance Measurement Based on a Speed Adjustment Model.
Sensors, 2019

An extended description logic system with knowledge element based on ALC.
CoRR, 2019

2018
A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery.
RFC, October, 2018

Extensions to BGP-Signaled Pseudowires to Support Flow-Aware Transport Labels.
RFC, June, 2018

Power Peak Shaving With Data Transmission Delays for Thermal Management in Smart Buildings.
IEEE Trans. Ind. Informatics, 2018

The Statistical Analysis of Cloud Evolutionary Strategy.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

2017
Q-Learning-Based Power Control for LTE Enterprise Femtocell Networks.
IEEE Syst. J., 2017

Big-Data Cloud Services Platform for Growth Enterprises with Adaptive Exception Handling and Parallelized Data Mining.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

2016
Runtime Exceptions Handling for Collaborative SOA Applications.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Research on Micro-blog New Word Recognition Based on MapReduce.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

Active Customization-Oriented Adaptive SOA with Runtime Exception Handling.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

2015
Power Admission Control With Predictive Thermal Management in Smart Buildings.
IEEE Trans. Ind. Electron., 2015

2014
Toward Customer-centric SOA: Services Resource Active Provisioning Approach.
J. Softw., 2014

A Novel Trusted Computing Model for Network Security Authentication.
J. Networks, 2014

An energy-saving mechanism for mobile terminals based on LTE-A uplink CoMP.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
Chinese Personal Name Recognition in Web Queries via Bootstrapping.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Active and Adaptive Services Resource Provisioning with Personalized Customization.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Network Security Situation Element Extraction Based on Projection Pursuit Regression.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Distributed and Collaborative Requirements Elicitation Based on Social Intelligence.
Proceedings of the Ninth Web Information Systems and Applications Conference, 2012

2011
A construction of optimal sets of FH sequences.
Australas. J Comb., 2011

2010
Building Requirements Semantics for Networked Software Interoperability.
J. Softw. Eng. Appl., 2010

Process Semantic-Enabled Customisation for Active Service Provisioning.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Optimal grid holey packings with block size 3 and 4.
Des. Codes Cryptogr., 2009

Connecting Ontologies: Semantic Carrier of Requirements for Networked Software.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

Project Scheduling Problem for Software Development with Random Fuzzy Activity Duration Times.
Proceedings of the Advances in Neural Networks, 2009

Fuzzy ontology generation model using fuzzy clustering for learning evaluation.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2006
Comparative Proteome Analysis of Breast Cancer and Adjacent Normal Breast Tissues in Human.
Genom. Proteom. Bioinform., 2006

2005
Land-use change analysis in Shenmu county in the leoss plateau of China using remote sensing and GIS.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...