Wenjie Yang

Orcid: 0000-0002-5326-5382

According to our database1, Wenjie Yang authored at least 75 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Latent-Guided Exemplar-Based Image Re-Colorization.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
Psychodynamic-based virtual reality cognitive training system with personalized emotional arousal elements for mild cognitive impairment patients.
Comput. Methods Programs Biomed., November, 2023

Deformable convolution and coordinate attention for fast cattle detection.
Comput. Electron. Agric., August, 2023

A linearly implicit energy-preserving exponential time differencing scheme for the fractional nonlinear Schrödinger equation.
Networks Heterog. Media, 2023

What Makes Digital Support Effective? How Therapeutic Skills Affect Clinical Well-Being.
CoRR, 2023

Understanding Community Bias Amplification in Graph Representation Learning.
CoRR, 2023

StructComp: Substituting propagation with Structural Compression in Training Graph Contrastive Learning.
CoRR, 2023

Images Connect Us Together: Navigating a COVID-19 Local Outbreak in China Through Social Media Images.
CoRR, 2023

Shaping Online Dialogue: Examining How Community Rules Affect Discussion Structures on Reddit.
CoRR, 2023

HybridNet: Integrating GCN and CNN for skeleton-based action recognition.
Appl. Intell., 2023

Research of Agricultural Supply Chain Finance Based on Blockchain Technology: Findings from Chinese Industry.
Proceedings of the Machine Learning and Artificial Intelligence, 2023

A System for Real-Time Recognition and Fast Retrieval of Close Contacts in Multi-Camera Videos.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

Cross-view Semantic Alignment for Livestreaming Product Recognition.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Cross-Domain Product Representation Learning for Rich-Content E-Commerce.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Integrating Appearance and Spatial-Temporal Information for Multi-Camera People Tracking.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Chemical process fault detection using modified CVDA with memory mechanism.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects.
IEEE Trans. Neural Networks Learn. Syst., 2022

Semi-Supervised Deep Transfer Learning for Benign-Malignant Diagnosis of Pulmonary Nodules in Chest CT Images.
IEEE Trans. Medical Imaging, 2022

Bottom-Up Foreground-Aware Feature Fusion for Practical Person Search.
IEEE Trans. Circuits Syst. Video Technol., 2022

"Help! Can You Hear Me?": Understanding How Help-Seeking Posts are Overwhelmed on Social Media during a Natural Disaster.
Proc. ACM Hum. Comput. Interact., 2022

Edge data integrity verification scheme supporting data dynamics and batch auditing.
J. Syst. Archit., 2022

Incremental Road Network Update Method with Trajectory Data and UAV Remote Sensing Imagery.
ISPRS Int. J. Geo Inf., 2022

Exploring the Semi-Supervised Video Object Segmentation Problem from a Cyclic Perspective.
Int. J. Comput. Vis., 2022

Pattern Dynamics in a Predator-Prey Model with Diffusion Network.
Complex., 2022

Know It to Defeat It: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Speed up Object Detection on Gigapixel-level Images with Patch Arrangement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Facilitating Continuous Text Messaging in Online Romantic Encounters by Expanded Keywords Enumeration.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022

How to Save Lives with Microblogs? Lessons From the Usage of Weibo for Requests for Medical Assistance During COVID-19.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Building Knowledge Graphs of Experientially Related Concepts.
Proceedings of the 4th Conference on Automated Knowledge Base Construction, 2022

2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021

Relation Selective Graph Convolutional Network for Skeleton-Based Action Recognition.
Symmetry, 2021

Shallow Graph Convolutional Network for Skeleton-Based Action Recognition.
Sensors, 2021

An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System.
IEEE Internet Things J., 2021

Unveiling personnel movement in a larger indoor area with a non-overlapping multi-camera system.
CoRR, 2021

2020
Improve Person Re-Identification With Part Awareness Learning.
IEEE Trans. Image Process., 2020

Rethinking of Pedestrian Attribute Recognition: Realistic Datasets with Efficient Method.
CoRR, 2020

A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects.
CoRR, 2020

A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020

Pavement Crack Detection Using Attention U-Net with Multiple Sources.
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020

Bottom-Up Foreground-Aware Feature Fusion for Person Search.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

A Service Selection Method Based on QoS in IOT.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

"A Postcard from Your Food Journey in the Past": Promoting Self-Reflection on Social Food Posting.
Proceedings of the DIS '20: Designing Interactive Systems Conference 2020, 2020

2019
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC.
IEEE Access, 2019

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019

Fully Secure Lightweight Certificateless Signature Scheme for IIoT.
IEEE Access, 2019

Towards Rich Feature Discovery With Class Activation Maps Augmentation for Person Re-Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018

Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model.
Int. J. Netw. Secur., 2018

EANet: Enhancing Alignment for Cross-Domain Person Re-identification.
CoRR, 2018

LTE on License-Exempt Spectrum.
IEEE Commun. Surv. Tutorials, 2018

Fully distributed certificateless threshold signature without random oracles.
Sci. China Inf. Sci., 2018

Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility Prediction.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Narrowband Wireless Access for Low-Power Massive Internet of Things: A Bandwidth Perspective.
IEEE Wirel. Commun., 2017

Robust Synchronization Waveform Design for Massive IoT.
IEEE Trans. Wirel. Commun., 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017

Enhanced System Acquisition for NB-IoT.
IEEE Access, 2017

New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Cellular machine-type comm unications: physical challenges and solutions.
IEEE Wirel. Commun., 2016

Rank One Strange Attractors in Periodically Kicked Predator-Prey System with Time-Delay.
Int. J. Bifurc. Chaos, 2016

Cellular Communications on License-Exempt Spectrum: A Tutorial.
CoRR, 2016

The Evolution of LTE Physical Layer Control Channels.
IEEE Commun. Surv. Tutorials, 2016

Cellular communications on license-exempt spectrum.
IEEE Commun. Mag., 2016

2015
Rank One Chaos in Periodically-Kicked Time-Delayed Chen System.
Int. J. Bifurc. Chaos, 2015

2014
H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment.
J. Supercomput., 2014

High-Efficiency Mode Decision Procedure for H.264/AVC Under Cloud Computing Environments.
IEEE Syst. J., 2014

Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Secur. Commun. Networks, 2014

Peer-to-peer communications in a cellular network.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

2013
Isolating Influential Regions of Electrostatic Focusing in Protein and DNA Structure.
IEEE ACM Trans. Comput. Biol. Bioinform., 2013

Big Data Real-Time Processing Based on Storm.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A Novel Full-reference Video Quality Assessment Metric for Multimedia Broadcasting Systems.
J. Mobile Multimedia, 2012

Practical Certificateless Public Key Encryption in the Standard Model.
Proceedings of the Network and System Security - 6th International Conference, 2012

An Efficient Quality Metric for DIBR-based 3D Video.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Improved Motion Vector Recovery in Temporal Error Concealment for H.264/AVC Decoder.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

An Efficient Quality Assessment Metric for 3D Video.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2004
A vision based road detection algorithm.
Proceedings of the 2004 IEEE Conference on Robotics, Automation and Mechatronics, 2004


  Loading...