Weifeng Chen

According to our database1, Weifeng Chen authored at least 39 papers between 2000 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Introducing <i>KIPET</i>: A novel open-source software package for kinetic parameter estimation from experimental datasets including spectra.
Comput. Chem. Eng., 2020

OASIS: A Large-Scale Dataset for Single Image 3D in the Wild.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

An approach for topology optimization of damping layer under harmonic excitations based on piecewise constant level set method.
J. Comput. Phys., 2019

The influence of transformed government on citizen trust: insights from Bahrain.
Inf. Technol. Dev., 2019

Learning to Sit: Synthesizing Human-Chair Interactions via Hierarchical Control.
CoRR, 2019

Learning Single-Image Depth From Videos Using Quality Assessment Networks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Cluster-aware arrangement of the parallel coordinate plots.
J. Vis. Lang. Comput., 2018

Learning Single-Image Depth from Videos using Quality Assessment Networks.
CoRR, 2018

An Improved Privacy Protection Security Protocol Based on NFC.
Int. J. Netw. Secur., 2017

Surface Normals in the Wild.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Multi-Viewpoint Panorama Construction With Wide-Baseline Images.
IEEE Trans. Image Process., 2016

Trajectory optimization for lunar soft landing with a Hamiltonian-based adaptive mesh refinement strategy.
Adv. Eng. Softw., 2016

A unified trajectory optimization framework for lunar ascent.
Adv. Eng. Softw., 2016

Single-Image Depth Perception in the Wild.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

VFA: A Variable-Factor Authentication Framework for Mobile Users.
J. Commun., 2015

Mobile OS security: Current situation and future directions.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

An examination of distributed denial of service attacks.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Privacy-assured substructure similarity query over encrypted graph-structured data in cloud.
Secur. Commun. Networks, 2014

High-Quality Depth Recovery via Interactive Multi-view Stereo.
Proceedings of the 2nd International Conference on 3D Vision, 2014

Analytic Double Product Integrals for All-Frequency Relighting.
IEEE Trans. Vis. Comput. Graph., 2013

INCOME: Practical land monitoring in precision agriculture with sensor networks.
Comput. Commun., 2013

COCA: Constructing optimal clustering architecture to maximize sensor network lifetime.
Comput. Commun., 2013

Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Sensitivity embedded homotopy-based backtracking method for chemical process simulation.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization.
IEEE Trans. Veh. Technol., 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Harmonic coordinates for real-time image cloning.
J. Zhejiang Univ. Sci. C, 2010

On the privacy protection in publish/subscribe systems.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Wireless Access Point Deployment for Both Coverage and Localization.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A modified mnemonic enhancement optimization method for solving parametric nonlinear programming problems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Fast, Sub-pixel Antialiased Shadow Maps.
Comput. Graph. Forum, 2009

Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

A Soft Constraint Privacy Model based on Identifiability.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

HPtaa database-potential target genes for clinical diagnosis and immunotherapy of human carcinoma.
Nucleic Acids Res., 2006

Agent-Based Data Mining Approach for the Prediction of UK and Irish Companies Performance.
Proceedings of the Key Technologies for Data Management, 2004

Recommendations in Using Group Key Management Algorithms.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Performance Comparison of Stateful and Stateless Group Rekeying Algorithms.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000