Wenjie Yang
Orcid: 0000-0002-5326-5382
According to our database1,
Wenjie Yang
authored at least 75 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
2023
Psychodynamic-based virtual reality cognitive training system with personalized emotional arousal elements for mild cognitive impairment patients.
Comput. Methods Programs Biomed., November, 2023
Comput. Electron. Agric., August, 2023
A linearly implicit energy-preserving exponential time differencing scheme for the fractional nonlinear Schrödinger equation.
Networks Heterog. Media, 2023
What Makes Digital Support Effective? How Therapeutic Skills Affect Clinical Well-Being.
CoRR, 2023
CoRR, 2023
StructComp: Substituting propagation with Structural Compression in Training Graph Contrastive Learning.
CoRR, 2023
Images Connect Us Together: Navigating a COVID-19 Local Outbreak in China Through Social Media Images.
CoRR, 2023
Shaping Online Dialogue: Examining How Community Rules Affect Discussion Structures on Reddit.
CoRR, 2023
Appl. Intell., 2023
Research of Agricultural Supply Chain Finance Based on Blockchain Technology: Findings from Chinese Industry.
Proceedings of the Machine Learning and Artificial Intelligence, 2023
A System for Real-Time Recognition and Fast Retrieval of Close Contacts in Multi-Camera Videos.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Integrating Appearance and Spatial-Temporal Information for Multi-Camera People Tracking.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the CAA Symposium on Fault Detection, 2023
2022
IEEE Trans. Neural Networks Learn. Syst., 2022
Semi-Supervised Deep Transfer Learning for Benign-Malignant Diagnosis of Pulmonary Nodules in Chest CT Images.
IEEE Trans. Medical Imaging, 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
"Help! Can You Hear Me?": Understanding How Help-Seeking Posts are Overwhelmed on Social Media during a Natural Disaster.
Proc. ACM Hum. Comput. Interact., 2022
J. Syst. Archit., 2022
Incremental Road Network Update Method with Trajectory Data and UAV Remote Sensing Imagery.
ISPRS Int. J. Geo Inf., 2022
Exploring the Semi-Supervised Video Object Segmentation Problem from a Cyclic Perspective.
Int. J. Comput. Vis., 2022
Know It to Defeat It: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Facilitating Continuous Text Messaging in Online Romantic Encounters by Expanded Keywords Enumeration.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022
How to Save Lives with Microblogs? Lessons From the Usage of Weibo for Requests for Medical Assistance During COVID-19.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the 4th Conference on Automated Knowledge Base Construction, 2022
2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
Relation Selective Graph Convolutional Network for Skeleton-Based Action Recognition.
Symmetry, 2021
Sensors, 2021
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System.
IEEE Internet Things J., 2021
Unveiling personnel movement in a larger indoor area with a non-overlapping multi-camera system.
CoRR, 2021
2020
IEEE Trans. Image Process., 2020
Rethinking of Pedestrian Attribute Recognition: Realistic Datasets with Efficient Method.
CoRR, 2020
CoRR, 2020
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
"A Postcard from Your Food Journey in the Past": Promoting Self-Reflection on Social Food Posting.
Proceedings of the DIS '20: Designing Interactive Systems Conference 2020, 2020
2019
IEEE Access, 2019
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019
IEEE Access, 2019
Towards Rich Feature Discovery With Class Activation Maps Augmentation for Person Re-Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2018
Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018
Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model.
Int. J. Netw. Secur., 2018
Sci. China Inf. Sci., 2018
Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility Prediction.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
2017
Narrowband Wireless Access for Low-Power Massive Internet of Things: A Bandwidth Perspective.
IEEE Wirel. Commun., 2017
IEEE Trans. Wirel. Commun., 2017
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
IEEE Wirel. Commun., 2016
Rank One Strange Attractors in Periodically Kicked Predator-Prey System with Time-Delay.
Int. J. Bifurc. Chaos, 2016
IEEE Commun. Surv. Tutorials, 2016
2015
Int. J. Bifurc. Chaos, 2015
2014
H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment.
J. Supercomput., 2014
High-Efficiency Mode Decision Procedure for H.264/AVC Under Cloud Computing Environments.
IEEE Syst. J., 2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Secur. Commun. Networks, 2014
Proceedings of the IEEE International Conference on Consumer Electronics, 2014
2013
Isolating Influential Regions of Electrostatic Focusing in Protein and DNA Structure.
IEEE ACM Trans. Comput. Biol. Bioinform., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
A Novel Full-reference Video Quality Assessment Metric for Multimedia Broadcasting Systems.
J. Mobile Multimedia, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2004
Proceedings of the 2004 IEEE Conference on Robotics, Automation and Mechatronics, 2004