Wenbo He

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Robust Neural Rendering in the Wild with Asymmetric Dual 3D Gaussian Splatting.
CoRR, June, 2025

Joint-stochastic-approximation Autoencoders with Application to Semi-supervised Learning.
CoRR, May, 2025

MEN-VVDF: Multipath excitation network-based video violence detection framework focusing on human activity in keyframes.
J. Vis. Commun. Image Represent., 2025

SlimDL: Deploying ultra-light deep learning model on sweeping robots.
Eng. Appl. Artif. Intell., 2025

Multi-source perception data fusion of vessels in visual occlusion scenarios: Leveraging prior knowledge of vessel motion.
Eng. Appl. Artif. Intell., 2025

2024
3D hand reconstruction via aggregating intra and inter graphs guided by prior knowledge for hand-object interaction scenario.
J. Vis. Commun. Image Represent., 2024

Mitigating Noisy Supervision Using Synthetic Samples with Soft Labels.
CoRR, 2024

Learning with Noisy Ground Truth: From 2D Classification to 3D Reconstruction.
CoRR, 2024

3D Hand Reconstruction via Aggregating Intra and Inter Graphs Guided by Prior Knowledge for Hand-Object Interaction Scenario.
CoRR, 2024

Spatiotemporal Co-Design Enabling Prioritized Multi-Agent Motion Planning.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2024

Utility-Preserving Face Anonymization via Differentially Private Feature Operations.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Lightweight 3D hand pose estimation by cascading CNNs with reinforcement learning.
Pattern Recognit. Lett., October, 2023

Spatial characteristics of closed-loop TMS-EEG with occipital alpha-phase synchronized.
Biomed. Signal Process. Control., May, 2023

Novel Fundus Image Preprocessing for Retcam Images to Improve Deep Learning Classification of Retinopathy of Prematurity.
CoRR, 2023

Revisit Linear Transformation for Image Privacy in Machine Learning.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key.
Proceedings of the Rough Sets - International Joint Conference, 2023

Preventing Image Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Value Iteration Algorithm for Solving Shortest Path Problems with Homology Class Constraints.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Differential Dynamic Programming-based Approach for Balancing Energy and Time Optimality in Motion Planning.
Proceedings of the 59th Annual Allerton Conference on Communication, 2023

Rethinking Label Refurbishment: Model Robustness under Label Noise.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An Ensemble Model for Combating Label Noise.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Noise Attention Learning: Enhancing Noise Robustness by Gradient Scaling.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Motion Planning with Homotopy Class Constraints via the Auxiliary Energy Reduction Technique.
Proceedings of the American Control Conference, 2022

2021
Confidence Adaptive Regularization for Deep Learning with Noisy Labels.
CoRR, 2021

Co-matching: Combating Noisy Labels by Augmentation Anchoring.
CoRR, 2021

CLTA: Contents and Length-based Temporal Attention for Few-shot Action Recognition.
CoRR, 2021

VideoLoc: Video-based Indoor Localization with Text Information.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

MixNN: Combating Noisy Labels in Deep Learning by Mixing with Nearest Neighbors.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Few-Shot Learning of Video Action Recognition Only Based on Video Contents.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

An Accurate Frequency Estimation Algorithm by Using DFT and Cosine Windows.
Proceedings of the Communications and Networking, 2020

2019
VidAnomaly: LSTM-Autoencoder-Based Adversarial Learning for One-Class Video Classification With Multiple Dynamic Images.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
A Fine-Grained Stateful Data Analytics Method Based on Resilient State Table.
Int. J. Softw. Sci. Comput. Intell., 2018

Naxos: A Named Data Networking Consensus Protocol.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Random Draw Forest: A Salient Index for Similarity Search Over Multimedia Data.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

Dynamic Partition Forest: An Efficient and Distributed Indexing Scheme for Similarity Search based on Hashing.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Privacy aware web services in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A RST-based stateful data analytics within spark.
Proceedings of the 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2017

2016
SafeCam: Analyzing intersection-related driver behaviors using multi-sensor smartphones.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Integer-forcing source coding: Successive cancellation and source-channel duality.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Consistent replication protocol for Named Data Networking.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

2015
Collision Scheduling for Cellular Networks with Spatial Connectivity Constraints.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Collision scheduling for cellular networks.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Integer-forcing interference alignment: Iterative optimization via aligned lattice reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2015

ScalaSEM: Scalable validation of SDN design with deployable code.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

I know what you did on your smartphone: Inferring app usage over encrypted data traffic.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Cloud-assisted distributed private data sharing.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Dirty-paper integer-forcing.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare.
IEEE Internet Comput., 2014

Uplink-downlink duality for integer-forcing: Effective SINRs and iterative optimization.
Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2014

Uplink-downlink duality for integer-forcing.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2011
EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts.
Ad Hoc Sens. Wirel. Networks, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2010
Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2008
Achieving Privacy and Integrity of Data Aggregation in Wireless Sensor Networks
PhD thesis, 2008

2002
Generalized loop-back recovery in optical mesh networks.
IEEE/ACM Trans. Netw., 2002


  Loading...