Jiehong Wu

Orcid: 0000-0002-0851-3009

According to our database1, Jiehong Wu authored at least 12 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on micro parallax adversarial sample generation method based on texture sensitive region.
J. Intell. Fuzzy Syst., January, 2024

2023
An Adaptive Conversion Speed Q-Learning Algorithm for Search and Rescue UAV Path Planning in Unknown Environments.
IEEE Trans. Veh. Technol., December, 2023

2022
Reinforcement Learning and Particle Swarm Optimization Supporting Real-Time Rescue Assignments for Multiple Autonomous Underwater Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

2021
Autonomous Cooperative Flocking for Heterogeneous Unmanned Aerial Vehicle Group.
IEEE Trans. Veh. Technol., 2021

Application of Decision Tree Integrated Hybrid Classifier in Feature-Fused Robot Big Data.
Proceedings of the ICCIR 2021: International Conference on Control and Intelligent Robotics, 2021

2019
A multi-UAV clustering strategy for reducing insecure communication range.
Comput. Networks, 2019

DENPSO: A Distance Evolution Nonlinear PSO Algorithm for Energy-Efficient Path Planning in 3D UASNs.
IEEE Access, 2019

An Energy-Aware Transmission Target Selection Mechanism for UAV Networking.
IEEE Access, 2019

2017
Study for ELM-based recognition of fold structure aiming at remote sensing image.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2007
The study for protecting mobile agents based on time checking technology.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...