default search action
Wen Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Kaiyang Liao, Jie Lin, Yuanlin Zheng, Keer Wang, Wen Feng:
Incremental image retrieval method based on feature perception and deep hashing. Int. J. Multim. Inf. Retr. 13(1): 10 (2024) - [j15]Xi Wang, Fu Yang, Songbo Liu, Wen Feng:
No big deal: how leader self-deprecating humor influences subordinate learning from failure. J. Knowl. Manag. 28(1): 118-137 (2024) - 2022
- [j14]Jieren Cheng, Xinzhi Yao, Hui Li, Hao Lu, Naixue Xiong, Ping Luo, Le Liu, Hao Guo, Wen Feng:
Cooperative Detection Method for DDoS Attacks Based on Blockchain. Comput. Syst. Sci. Eng. 43(1): 103-117 (2022) - [j13]Haoxiang Tao, Xiaofeng Xie, Rongnian Tang, Yao Hou, Jingru Li, Wen Feng, Youlong Chen, Gaodi Xu:
Adaptive group Riemannian manifold learning for hyperspectral image classification. Int. J. Wirel. Mob. Comput. 22(3/4): 300-309 (2022) - [j12]Rongnian Tang, Yuke Ning, Chuang Li, Wen Feng, Youlong Chen, Xiaofeng Xie:
Numerical Forecast Correction of Temperature and Wind Using a Single-Station Single-Time Spatial LightGBM Method. Sensors 22(1): 193 (2022) - 2021
- [j11]Pengju Zhao, Xianrui Zheng, Ying Yu, Zhuocheng Hou, Chenguang Diao, Haifei Wang, Huimin Kang, Chao Ning, Junhui Li, Wen Feng, Wen Wang, George E. Liu, Bugao Li, Jacqueline Smith, Yangzom Chamba, Jianfeng Liu:
Mining Unknown Porcine Protein Isoforms by Tissue-based Map of Proteome Enhances Pig Genome Annotation. Genom. Proteom. Bioinform. 19(5): 772-786 (2021) - [j10]Xuefeng Ding, Wen Feng:
An anomaly detection method based on feature mining for wireless sensor networks. Int. J. Sens. Networks 36(3): 167-173 (2021) - [j9]Wen Feng, Xuefeng Ding:
A congestion attack behaviour recognition method for wireless sensor networks based on a decision tree. Int. J. Sens. Networks 36(4): 236-242 (2021) - [j8]Yunliang Qi, Zhen Yang, Junqiang Lei, Jing Lian, Jizhao Liu, Wen Feng, Yide Ma:
Morph_SPCNN model and its application in breast density segmentation. Multim. Tools Appl. 80(2): 2821-2845 (2021) - [c6]Wen Feng, Jieren Cheng, Yuming Yuan, Xinbin Xu, Yuqing Kou, Yuanshen Li, Xiulai Li:
Trust Evaluation Mechanism of Service Nodes Based on Blockchain. DMBD (1) 2021: 230-239 - [c5]Lulin Cai, Yiduan Qian, Yajuan He, Wen Feng:
Design of Approximate Multiplierless DCT with CSD Encoding for Image Processing. ISCAS 2021: 1-4
2010 – 2019
- 2018
- [j7]Ruochen Liu, Jianxia Li, Wen Feng, Xin Yu, Licheng Jiao:
A new angle-based preference selection mechanism for solving many-objective optimization problems. Soft Comput. 22(19): 6311-6327 (2018) - 2017
- [c4]Wen Feng, Hongjia Li, Ding Tang, Liming Wang, Zhen Xu:
A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks. 5GWN 2017: 609-621 - [c3]Wen Feng, Yu Zhang:
Effects of a grain ahead on dolphin's transmitting performance. ICSPCC 2017: 1-5 - 2016
- [j6]Ruochen Liu, Ruinan Wang, Wen Feng, Junjun Huang, Licheng Jiao:
Interactive Reference Region Based Multi-Objective Evolutionary Algorithm Through Decomposition. IEEE Access 4: 7331-7346 (2016)
2000 – 2009
- 2002
- [j5]Wen Feng, Jinhong Yuan, Branka Vucetic:
A code-matched interleaver design for turbo codes. IEEE Trans. Commun. 50(6): 926-937 (2002) - [j4]Jinhong Yuan, Wen Feng, Branka Vucetic:
Performance of parallel and serial concatenated codes on fading channels. IEEE Trans. Commun. 50(10): 1600-1608 (2002) - 2001
- [j3]Jinhong Yuan, Branka Vucetic, Wen Feng, Mark Tan:
Design of cyclic shift interleavers for Turbo Codes. Ann. des Télécommunications 56(7-8): 384-393 (2001)
1990 – 1999
- 1999
- [j2]Jinhong Yuan, Branka Vucetic, Wen Feng:
Combined turbo codes and interleaver design. IEEE Trans. Commun. 47(4): 484-487 (1999) - [c2]Hong Xiao, Wen Feng, Branka Vucetic:
Joint source-turbo coding and its application for real-time low-bit-rate speech transmission. ICC 1999: 103-107 - 1995
- [j1]Jacob Augustine, Wen Feng, Anamitra Makur, James Jacob:
Switching theoretic approach to image compression. Signal Process. 44(2): 243-246 (1995) - [c1]Jacob Augustine, Wen Feng, James Jacob:
Logic minimization based approach for compressing image data. VLSI Design 1995: 225-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint