default search action
Wenlong Guo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Qingrun Zeng, Jiahao Huang, Jianzhong He, Shengwei Chen, Lei Xie, Zan Chen, Wenlong Guo, Sun Yao, Mengjun Li, Mingchu Li, Yuanjing Feng:
Automated Identification of the Retinogeniculate Visual Pathway Using a High-Dimensional Tractography Atlas. IEEE Trans. Cogn. Dev. Syst. 16(3): 818-827 (2024) - 2023
- [j13]Zan Chen, Chenxu Peng, Wenlong Guo, Lei Xie, Shanshan Wang, Qichuan ZhuGe, Caiyun Wen, Yuanjing Feng:
Uncertainty-guided transformer for brain tumor segmentation. Medical Biol. Eng. Comput. 61(12): 3289-3301 (2023) - [j12]Fuqiang Yao, Yonggang Zhu, Yifu Sun, Wenlong Guo:
Wireless communications "N + 1 dimensionality" endogenous anti-jamming: theory and techniques. Secur. Saf. 2: 2023003 (2023) - [c4]Li Ni, Yonggang Zhu, Kang An, Yifu Sun, Wenlong Guo:
Channel Domain Anti-Jamming based on Multi-Active Reconfigurable Intelligent Surfaces. WCSP 2023: 767-772 - 2022
- [j11]Jun Chen, Zheng Chang, Wenlong Guo, Xijuan Guo:
Resource Allocation and Computation Offloading for Wireless Powered Mobile Edge Computing. Sensors 22(16): 6002 (2022) - [j10]Wenlong Guo, Zheng Chang, Xijuan Guo, Peiliang Wu, Zhu Han:
Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach. IEEE Trans. Ind. Informatics 18(11): 7899-7909 (2022) - [c3]Longguang Wang, Yulan Guo, Yingqian Wang, Juncheng Li, Shuhang Gu, Radu Timofte, Liangyu Chen, Xiaojie Chu, Wenqing Yu, Kai Jin, Zeqiang Wei, Sha Guo, Angulia Yang, Xiuzhuang Zhou, Guodong Guo, Bin Dai, Feiyue Peng, Huaxin Xiao, Shen Yan, Yuxiang Liu, Hanxiao Cai, Pu Cao, Yang Nie, Lu Yang, Qing Song, Xiaotao Hu, Jun Xu, Mai Xu, Junpeng Jing, Xin Deng, Qunliang Xing, Minglang Qiao, Zhenyu Guan, Wenlong Guo, Chenxu Peng, Zan Chen, Junyang Chen, Hao Li, Junbin Chen, Weijie Li, Zhijing Yang, Gen Li, Aijin Li, Lei Sun, Dafeng Zhang, Shizhuo Liu, Jiangtao Zhang, Yanyun Qu, Hao-Hsiang Yang, Zhi-Kai Huang, Wei-Ting Chen, Hua-En Chang, Sy-Yen Kuo, Qiaohui Liang, Jianxin Lin, Yijun Wang, Lianying Yin, Rongju Zhang, Wei Zhao, Peng Xiao, Rongjian Xu, Zhilu Zhang, Wangmeng Zuo, Hansheng Guo, Guangwei Gao, Tieyong Zeng, Huicheng Pi, Shunli Zhang, Joohyeok Kim, HyeonA Kim, Eunpil Park, Jae-Young Sim, Jucai Zhai, Pengcheng Zeng, Yang Liu, Chihao Ma, Yulin Huang, Junying Chen:
NTIRE 2022 Challenge on Stereo Image Super-Resolution: Methods and Results. CVPR Workshops 2022: 905-918 - 2021
- [j9]Jianhuai Dong, Zhixuan Dong, Wenlong Guo:
Event-based efficient filtering for wireless network control systems with User Datagram Protocol. Int. J. Control 94(11): 2980-2991 (2021) - [j8]Zheng Chang, Wenlong Guo, Xijuan Guo, Tao Chen, Geyong Min, Khamael M. Abualnaja, Shahid Mumtaz:
Blockchain-Empowered Drone Networks: Architecture, Features, and Future. IEEE Netw. 35(1): 86-93 (2021) - [j7]Zan Chen, Wenlong Guo, Yuanjing Feng, Yongqiang Li, Changchen Zhao, Yi Ren, Ling Shao:
Deep-Learned Regularization and Proximal Operator for Image Compressive Sensing. IEEE Trans. Image Process. 30: 7112-7126 (2021) - 2020
- [j6]Xiaofeng Chen, Wenlong Guo:
Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images. Int. J. Netw. Secur. 22(1): 126-135 (2020) - [j5]Zheng Chang, Wenlong Guo, Xijuan Guo, Zhenyu Zhou, Tapani Ristaniemi:
Incentive Mechanism for Edge-Computing-Based Blockchain. IEEE Trans. Ind. Informatics 16(11): 7105-7114 (2020) - [c2]Zheng Chang, Wenlong Guo, Xijuan Guo, Tapani Ristaniemi:
Machine Learning-Based Resource Allocation for Multi-UAV Communications System. ICC Workshops 2020: 1-6 - [c1]Wenlong Guo, Zheng Chang, Xijuan Guo, Dushantha Nalin K. Jayakody, Tapani Ristaniemi:
Resource Allocation for Edge Computing-Based Blockchain: A Game Theoretic Approach. ICC Workshops 2020: 1-6
2010 – 2019
- 2019
- [j4]Jun Sun, Ke Chen, Guowen Ding, Wenlong Guo, Junming Zhao, Yijun Feng, Tian Jiang:
Achieving Directive Radiation and Broadband Microwave Absorption by an Anisotropic Metasurface. IEEE Access 7: 93919-93926 (2019) - [j3]Wenlong Guo, Guang-Ming Wang, Hai-Peng Li, Hai-Sheng Hou, He-Xiu Xu:
Analysis and Design of a Broadband Metasurface- Based Vortex Beam Generator. IEEE Access 7: 129529-129536 (2019) - 2018
- [j2]Kai-Yue Liu, Wenlong Guo, Guang-Ming Wang, Hai-Peng Li, Gang Liu:
A Novel Broadband Bi-Functional Metasurface for Vortex Generation and Simultaneous RCS Reduction. IEEE Access 6: 63999-64007 (2018) - [j1]Chengzhe Lai, Wenlong Guo, Yafei Li, Dong Zheng:
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications. Peer-to-Peer Netw. Appl. 11(5): 821-836 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint