Wenjun Gu

According to our database1, Wenjun Gu authored at least 24 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Multi-semantic granularity graphical model with ensemble BERTs and multi-staged training method for text classification.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

2016
Effects of Remanufacturable Product Design on Market Segmentation and the Environment.
Decis. Sci., 2016

Experimental quantification of implementation penalties from limited ADC resolution for Nyquist shaped higher-order QAM.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

Indoor visible light positioning system with multipath reflection analysis.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Indoor positioning with OFDM Visible Light Communications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Multipath Reflections Analysis on Indoor Visible Light Positioning System.
CoRR, 2015

Impact of Multipath Reflections on the Performance of Indoor Visible Light Positioning Systems.
CoRR, 2015

Indoor Location Estimation with Optical-based OFDM Communications.
CoRR, 2015

Indoor Positioning in High Speed OFDM Visible Light Communications.
CoRR, 2015

2011
Providing End-to-End Secure Communications in Wireless Sensor Networks.
IEEE Trans. Netw. Serv. Manag., 2011

Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

2010
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs.
IEEE Trans. Parallel Distributed Syst., 2010

2009
Sensor network configuration under physical attacks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

2008
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput., 2007

2006
Mutual anonymous overlay multicast.
J. Parallel Distributed Comput., 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Network Decoupling for Secure Communications in Wireless Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

A design of overlay anonymous multicast protocol.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
Defending against search-based physical attacks in sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Lifetime optimization of sensor networks under physical attacks.
Proceedings of IEEE International Conference on Communications, 2005


  Loading...