default search action
Wen Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Wanyu Su, Dezhi Cheng, Weihua Ni, Yao Ai, Xianwen Yu, Ninghang Tan, Jianping Wu, Wen Fu, Chenyu Li, Congying Xie, Meixiao Shen, Xiance Jin:
Multi-omics deep learning for radiation pneumonitis prediction in lung cancer patients underwent volumetric modulated arc therapy. Comput. Methods Programs Biomed. 254: 108295 (2024) - 2023
- [j7]Jinmao Tong, Zhongwang Cao, Wen Fu:
Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications. J. Intell. Syst. 32(1) (2023) - [j6]Wen Fu, Li Zhou, Jie Chen:
Query-Specific Embedding Co-Adaptation Improve Few-Shot Image Classification. IEEE Signal Process. Lett. 30: 783-787 (2023) - 2022
- [j5]Jianfeng Wang, Bo Liang, Lijun Zhao, Yuanfang Chen, Wen Fu, Peiji Yu, Hongbing Chen, Hongying Wang, Guojie Xie, Ting Wu, Muhammad Alam, Haitao Lv, Lin He:
Multiple Genetic Syndromes Recognition Based on a Deep Learning Framework and Cross-Loss Training. IEEE Access 10: 117084-117092 (2022) - [j4]Wen Fu, Li Zhou, Jie Chen:
Bidirectional Matching Prototypical Network for Few-Shot Image Classification. IEEE Signal Process. Lett. 29: 982-986 (2022) - [c15]Hongtao Guo, Cancan Shao, Wen Fu, Guang Zheng:
The Chinese Medicines of Integrated Therapies Against Rheumatoid Arthritis Retard Osteoporosis. BIBM 2022: 3807-3809 - [c14]Zhaohui Ye, Yanjie Li, Ronghao Guo, Jianqi Gao, Wen Fu:
Multi-agent Pathfinding with Communication Reinforcement Learning and Deadlock Detection. ICIRA (1) 2022: 493-504 - [c13]Feiyu Li, Runze Sun, Wen Fu, Xinyuan Qiao:
Hoist Wire Rope Fault Detection System Based on Wavelet Threshold and SVD Denoising. ICITEE 2022: 469-476 - [c12]Wen Fu, Yanjie Li, Zhaohui Ye, Qi Liu:
Decision Making for Autonomous Driving Via Multimodal Transformer and Deep Reinforcement Learning*. RCAR 2022: 481-486 - [c11]Hao Wen, Wen Fu, Yue Feng, Jiajie Chen, Wu Chen, Quanbin Lai, Binxuan Sun, Xingguang Duan:
Dynamic Parameters Identification for Manipulators Considering Physical Feasibility and Nonlinear Friction. ROBIO 2022: 610-615 - 2021
- [j3]Wen Fu, Zhongmao Li, Pengzhan Liu, Jingwen Cheng, Pengli Yang, Xin Qiu:
Compact bandpass filter based on single isosceles right triangular substrate integrated waveguide cavity and modified complementary compact microstrip resonant cell. IEICE Electron. Express 18(2): 20200397 (2021) - [j2]Wen Fu, Zhongmao Li, Pengzhan Liu, Jingwen Cheng, Xin Qiu:
Modeling and Analysis of Novel CSRRs-Loaded Dual-Band Bandpass SIW Filters. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2352-2356 (2021) - 2020
- [c10]Shusong Yang, Xiangyang Wang, Junyang Fang, Wen Fu, Zhengwen Huang:
A Solution to Ensure Correctness of Movement Authority. ICITE 2020: 547-550
2010 – 2019
- 2019
- [c9]Ye Tian, Wen Fu, Ao Peng:
Attitude Tracking based on Sequential Geomagnetic Observations. ICARM 2019: 587-592 - 2018
- [c8]Tian Sun, Wen Fu, Ao Peng, Lingxiang Zheng, Biyu Tang:
RSS-Based Map Construction for Indoor Localization. IPIN 2018: 1-8 - 2015
- [j1]Sinh Pham, Richard K. Lomotey, Wen Fu, Ralph Deters:
Peer-to-peer mobile data flow in a crop field. Int. J. Bus. Process. Integr. Manag. 7(3): 247-261 (2015) - [c7]Richard K. Lomotey, Sinh Pham, Wen Fu, Ralph Deters:
P2P Key-Value Storage Synchronization Workflow for Agronomic Data Management. IEEE MS 2015: 399-406
2000 – 2009
- 2009
- [c6]Qiang Wang, Jianmin Pang, Wen Fu, Feng Yue:
Graphical Annotation of Suspicious Behaviors. IFITA (3) 2009: 504-506 - [c5]Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu:
Static Analysis of Malware to Detect Exception Return. IFITA (3) 2009: 690-693 - 2008
- [c4]Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables. ACIS-ICIS 2008: 545-550 - [c3]Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao:
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. CSSE (2) 2008: 338-341 - [c2]Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu:
Formal Abstraction of Semantics for Detecting Malicious Code. CSSE (2) 2008: 350-353 - 2007
- [c1]Bo Wei, Hanying Hu, Wen Fu:
A Pseudo LEACH Algorithm for Wireless Sensor Networks. IMECS 2007: 1366-1370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint