default search action
Long Wen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Long Wen 0001 — China University of Geosciences, School of Mechanical Science and Engineering, Wuhan, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Jianan Wei, Hualin Chen, Yage Yuan, Haisong Huang, Long Wen, Weidong Jiao:
Novel imbalanced multi-class fault diagnosis method using transfer learning and oversampling strategies-based multi-layer support vector machines (ML-SVMs). Appl. Soft Comput. 167: 112324 (2024) - [j20]Jiaxin Wang, Jianan Wei, Haisong Huang, Long Wen, Yage Yuan, Hualin Chen, Rui Wu, Jinxing Wu:
IMWMOTE: A novel oversampling technique for fault diagnosis in heterogeneous imbalanced data. Expert Syst. Appl. 251: 123987 (2024) - [j19]Hualin Chen, Jianan Wei, Haisong Huang, Long Wen, Yage Yuan, Jinxing Wu:
Novel imbalanced fault diagnosis method based on generative adversarial networks with balancing serial CNN and Transformer (BCTGAN). Expert Syst. Appl. 258: 125171 (2024) - [j18]Long Wen, Yanjiao Yang, Bingyao Liu, Fengshun Zhang:
Kde-Entropy: preserve efficient filter. Signal Image Video Process. 18(1): 579-587 (2024) - [j17]Zijia Yang, Long Wen, Jiangtao Deng, Jianlin Tao, Zhenhong Liu, Danxia Liu:
FCOS-Based Anchor-Free Ship Detection Method for Consumer Electronic UAV Systems. IEEE Trans. Consumer Electron. 70(2): 4988-4997 (2024) - [c22]Jijing Cai, Han Zhu, Hailin Feng, Long Wen, Wei Wang, Meilei Lv, Kai Fang:
Vehicle Trajectory Prediction Based on Dynamic Graph Neural Network. CSCWD 2024: 67-72 - [c21]Yu Zhang, Long Wen, Xiangtong Yao, Zhenshan Bing, Linghuan Kong, Wei He, Alois Knoll:
Real-Time Adaptive Safety-Critical Control with Gaussian Processes in High-Order Uncertain Models. ICRA 2024: 14763-14769 - [c20]Xiaodong Wang, Long Wen, Jijing Cai, Kai Fang:
Intelligent Interference Information Fusion for Security of UAV Forest Remote Sensing Image Detection. Internetware 2024 - [c19]Tobias Betz, Long Wen, Fengjunjie Pan, Gemb Kaljavesi, Alexander Zuepke, Andrea Bastoni, Marco Caccamo, Alois Knoll, Johannes Betz:
A Containerized Microservice Architecture for a ROS 2 Autonomous Driving Software: An End-to-End Latency Evaluation. RTCSA 2024: 57-66 - [i6]Yu Zhang, Guangyao Tian, Long Wen, Xiangtong Yao, Liding Zhang, Zhenshan Bing, Wei He, Alois Knoll:
Online Efficient Safety-Critical Control for Mobile Robots in Unknown Dynamic Multi-Obstacle Environments. CoRR abs/2402.16449 (2024) - [i5]Yu Zhang, Long Wen, Xiangtong Yao, Zhenshan Bing, Linghuan Kong, Wei He, Alois Knoll:
Real-Time Adaptive Safety-Critical Control with Gaussian Processes in High-Order Uncertain Models. CoRR abs/2402.18946 (2024) - [i4]Tobias Betz, Long Wen, Fengjunjie Pan, Gemb Kaljavesi, Alexander Zuepke, Andrea Bastoni, Marco Caccamo, Alois Knoll, Johannes Betz:
A Containerized Microservice Architecture for a ROS 2 Autonomous Driving Software: An End-to-End Latency Evaluation. CoRR abs/2404.12683 (2024) - 2023
- [j16]Xin Zhao, Ke Wang, Sixian Wu, Long Wen, Zhibo Chen, Liang Dong, Mengyao Sun, Caicong Wu:
An obstacle avoidance path planner for an autonomous tractor using the minimum snap algorithm. Comput. Electron. Agric. 207: 107738 (2023) - [j15]Long Wen, Yu Cheng, Yi Fang, Xinyu Li:
A comprehensive survey of oriented object detection in remote sensing images. Expert Syst. Appl. 224: 119960 (2023) - [c18]Jianjie Lin, Markus Rickert, Long Wen, Fengjunjie Pan, Alois Knoll:
Knowledge-Augmented Anomaly Detection in Small Lot Production for Semantic Temporal Process Data. ETFA 2023: 1-8 - [c17]Fengshun Zhang, Yanjiao Yang, Tao Zhang, Long Wen, Tianjiao Yue:
Two-branch weakly supervised semantic segmentation network based on web data enhancement. ICCVIT 2023: 54:1-54:7 - [c16]Jianjie Lin, Markus Rickert, Long Wen, Yingbai Hu, Alois Knoll:
Robust Point Cloud Registration with Geometry-based Transformation Invariant Descriptor. IROS 2023: 7163-7170 - [c15]Long Wen, Markus Rickert, Fengjunjie Pan, Jianjie Lin, Alois Knoll:
Bare-Metal vs. Hypervisors and Containers: Performance Evaluation of Virtualization Technologies for Software-Defined Vehicles. IV 2023: 1-8 - [c14]Pengyun Zhu, Long Wen, Jinfei Liu, Feng Xue, Jian Lou, Zhibo Wang, Kui Ren:
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation. NeurIPS 2023 - 2022
- [j14]Long Wen:
Development Analysis of Cross-Border E-Commerce Logistics Based on Big Data Technology Under Safety Law Protection. Int. J. Inf. Syst. Serv. Sect. 14(2): 1-14 (2022) - 2021
- [j13]Ranting Tao, Kun Zhao, Hao Huang, Long Wen, Guifu Zhang, Ang Zhou, Haonan Chen:
Snow Particle Size Distribution From a 2-D Video Disdrometer and Radar Snowfall Estimation in East China. IEEE Trans. Geosci. Remote. Sens. 59(1): 196-207 (2021) - 2020
- [j12]Xiaodong Yang, Ting Li, Xizhen Pei, Long Wen, Caifen Wang:
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology. IEEE Access 8: 45468-45476 (2020) - [j11]Yu-Lei Zhang, Long Wen, Yong-Jie Zhang, Caifen Wang:
Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing. Multim. Tools Appl. 79(37-38): 27075-27090 (2020) - [j10]Jinkun Han, Wei Song, Amanda Gozho, Yunsick Sung, Sumi Ji, Liangliang Song, Long Wen, Qi Zhang:
LoRa-Based Smart IoT Application for Smart City: An Example of Human Posture Detection. Wirel. Commun. Mob. Comput. 2020: 8822555:1-8822555:15 (2020) - [j9]Long Wen, Jinkun Han, Liangliang Song, Qi Zhang, Kai Li, Zhi Li, Weimin Zhang, Beihai Zhang, Xin You, Yunsick Sung, Sumi Ji, Wei Song:
An Automated Real-Time Localization System in Highway and Tunnel Using UWB DL-TDoA Technology. Wirel. Commun. Mob. Comput. 2020: 8877654:1-8877654:15 (2020)
2010 – 2019
- 2019
- [j8]Long Wen, Lei He, Zhenhai Gao:
Research on 3D Point Cloud De-Distortion Algorithm and Its Application on Euclidean Clustering. IEEE Access 7: 86041-86053 (2019) - [j7]Yulei Zhang, Long Wen, Yongjie Zhang, Caifen Wang:
Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search. IEEE Access 7: 146542-146551 (2019) - [j6]Gang Chen, Kun Zhao, Long Wen, Mengyao Wang, Hao Huang, Mingjun Wang, Zhengwei Yang, Guifu Zhang, Pengfei Zhang, Wen-Chau Lee:
Microphysical Characteristics of Three Convective Events with Intense Rainfall Observed by Polarimetric Radar and Disdrometer in Eastern China. Remote. Sens. 11(17): 2004 (2019) - 2018
- [j5]Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang:
Statistical integral attack on CAST-256 and IDEA. Cryptogr. Commun. 10(1): 195-209 (2018) - [j4]Xufang Zhao, Ximing Liang, Long Wen:
The Artificial Bee Colony Algorithm Improved with Simplex Method. J. Softw. 13(6): 350-359 (2018) - [c13]Bo Ren, Jianping Liu, Ming Wang, Tao Wu, Long Wen:
An Evaluation Method for Technical Condition of Ground-Based TT&C Network. ICCC Workshops 2018: 49-53 - [c12]Xinggan Peng, Long Wen, Diqiu Bai, Bei Peng:
Reformative Vehicle License Plate Recognition Algorithm Based on Deep Learning. ICCSIP (2) 2018: 243-255 - 2016
- [c11]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. FSE 2016: 399-415 - [i3]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. IACR Cryptol. ePrint Arch. 2016: 178 (2016) - 2015
- [i2]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptol. ePrint Arch. 2015: 75 (2015) - 2014
- [j3]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard. Inf. Process. Lett. 114(6): 322-330 (2014) - [j2]Long Wen, Meiqin Wang, Jingyuan Zhao:
Related-Key Impossible Differential Attack on Reduced-Round LBlock. J. Comput. Sci. Technol. 29(1): 165-176 (2014) - [j1]Jingyuan Zhao, Meiqin Wang, Long Wen:
Improved Linear Cryptanalysis of CAST-256. J. Comput. Sci. Technol. 29(6): 1134-1139 (2014) - [c10]Long Wen, Meiqin Wang:
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. ACISP 2014: 454-461 - [c9]Long Wen, Meiqin Wang, Andrey Bogdanov:
Multidimensional Zero-Correlation Linear Cryptanalysis of E2. AFRICACRYPT 2014: 147-164 - [c8]Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - [c7]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. INDOCRYPT 2014: 161-176 - [c6]Wang Bin, Long Wen:
Analysis on the Effect of New Futures Contract Coming into Market: Taking the Related Metal Futures in SHFE for Example. ITQM 2014: 175-183 - [i1]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Note of Multidimensional MITM Attack on 25-Round TWINE-128. IACR Cryptol. ePrint Arch. 2014: 425 (2014) - 2013
- [c5]Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c4]Changfan Zhang, Long Wen, Yuanyuan Xiao, Jing He:
Sliding mode variable structure-based multi-shaft synchronous control method and its application in printing press. ICCA 2013: 1082-1086 - [c3]Long Wen, Jinwu Qian, Xiaowu Hu, Linyong Shen, Xi Wu, Changlin Yu:
Gait measurement and quantitative analysis in patients with Parkinson's disease for rehabilitation assessment. ROBIO 2013: 286-291 - [c2]Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Selected Areas in Cryptography 2013: 306-323
2000 – 2009
- 2009
- [c1]Long Wen:
Research on Retrieval of MES Components Based on Ontology. WKDD 2009: 175-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint