Wenyu Xu

Orcid: 0000-0001-6286-5518

According to our database1, Wenyu Xu authored at least 17 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Spatial-Frequency Fusion Network With Learnable Fractional Fourier Transform for Remote Sensing Imaging Enhancement.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025

Multi-view adaptive image enhancement with hierarchical attention for complex underground mining scenes.
Expert Syst. Appl., 2025

2024
MvKSR: Multi-View Knowledge-Guided Scene Recovery for Hazy and Rainy Degradation.
IEEE Trans. Instrum. Meas., 2024

Attention-oriented residual block for real-time low-light image enhancement in smart ports.
Comput. Electr. Eng., 2024

An Empirical Study of Cross-Project Pull Request Recommendation in GitHub.
Proceedings of the 31st Asia-Pacific Software Engineering Conference, 2024

2023
PosNet: Estimating lettuce fresh weight in plant factory based on oblique image.
Comput. Electron. Agric., October, 2023

Let You See in Haze and Sandstorm: Two-in-One Low-Visibility Enhancement Network.
IEEE Trans. Instrum. Meas., 2023

2022
FEA-Swin: Foreground Enhancement Attention Swin Transformer Network for Accurate UAV-Based Dense Object Detection.
Sensors, 2022

Low-Light Image Enhancement via Gradient Prior-Aided Network.
IEEE Access, 2022

Attention-guided Multiple Receptive Field Residual Block for Single Low-light Image Enhancement.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

2020
Secure mutual authentication with privacy preservation in vehicular ad hoc networks.
Veh. Commun., 2020

2019
Integrity Audit of Shared Cloud Data with Identity Tracking.
Secur. Commun. Networks, 2019

2018
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Sensors, 2018

A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter.
J. Inf. Secur. Appl., 2018

2017
Traffic Congestion Level Prediction Based on Video Processing Technology.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

ARM-K: A Methodology for Mining Associations of Traffic Congested Links.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017


  Loading...