


Остановите войну!
for scientists:
Wenjie Ruan
Person information

- affiliation: University of Exeter, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Zhenzhong Zhang, Chunxiang Guo, Wenjie Ruan, Wei Wang, Peng Zhou:
An intelligent stochastic optimization approach for stochastic order allocation problems with high-dimensional order uncertainties. Comput. Ind. Eng. 167: 108008 (2022) - 2021
- [j10]Dawei Chen, Jiangtao Wang
, Wenjie Ruan, Qiang Ni
, Sumi Helal:
Enabling Cost-Effective Population Health Monitoring By Exploiting Spatiotemporal Correlation: An Empirical Study. ACM Trans. Comput. Heal. 2(2): 11:1-11:19 (2021) - [j9]Chenwang Zheng
, Dan Tao
, Jiangtao Wang
, Lei Cui
, Wenjie Ruan, Shui Yu
:
Memory Augmented Hierarchical Attention Network for Next Point-of-Interest Recommendation. IEEE Trans. Comput. Soc. Syst. 8(2): 489-499 (2021) - [c28]Wenjie Ruan, Xinping Yi, Xiaowei Huang:
Adversarial Robustness of Deep Learning: Theory, Algorithms, and Applications. CIKM 2021: 4866-4869 - [c27]Liantao Ma, Xinyu Ma, Junyi Gao, Xianfeng Jiao, Zhihao Yu, Chaohe Zhang, Wenjie Ruan, Yasha Wang, Wen Tang, Jiangtao Wang
:
Distilling Knowledge from Publicly Available Online EMR Data to Emerging Epidemic for Prognosis. WWW 2021: 3558-3568 - [i16]Yanghao Zhang, Fu Wang, Wenjie Ruan:
Fooling Object Detectors: Adversarial Attacks by Half-Neighbor Masks. CoRR abs/2101.00989 (2021) - [i15]Fu Wang, Yanghao Zhang, Yanbin Zheng, Wenjie Ruan:
Gradient-Guided Dynamic Efficient Adversarial Training. CoRR abs/2103.03076 (2021) - [i14]Han Wu, Wenjie Ruan:
Adversarial Driving: Attacking End-to-End Autonomous Driving Systems. CoRR abs/2103.09151 (2021) - [i13]Nicolas Berthier, Youcheng Sun, Wei Huang, Yanghao Zhang, Wenjie Ruan, Xiaowei Huang:
Tutorials on Testing Neural Networks. CoRR abs/2108.01734 (2021) - [i12]Wenjie Ruan, Xinping Yi, Xiaowei Huang:
Adversarial Robustness of Deep Learning: Theory, Algorithms, and Applications. CoRR abs/2108.10451 (2021) - [i11]Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, Qiang Ni:
Sparse Adversarial Video Attacks with Spatial Transformations. CoRR abs/2111.05468 (2021) - 2020
- [j8]Xiaowei Huang
, Daniel Kroening, Wenjie Ruan
, James Sharp
, Youcheng Sun, Emese Thamo, Min Wu, Xinping Yi:
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability. Comput. Sci. Rev. 37: 100270 (2020) - [j7]Min Wu, Matthew Wicker, Wenjie Ruan
, Xiaowei Huang
, Marta Kwiatkowska:
A game-based approximate verification of deep neural networks with provable guarantees. Theor. Comput. Sci. 807: 298-329 (2020) - [c26]Liantao Ma, Junyi Gao, Yasha Wang, Chaohe Zhang, Jiangtao Wang, Wenjie Ruan, Wen Tang, Xin Gao, Xinyu Ma:
AdaCare: Explainable Clinical Health Status Representation Learning via Scale-Adaptive Feature Extraction and Recalibration. AAAI 2020: 825-832 - [c25]Liantao Ma, Chaohe Zhang, Yasha Wang, Wenjie Ruan, Jiangtao Wang, Wen Tang, Xinyu Ma, Xin Gao, Junyi Gao:
ConCare: Personalized Clinical Feature Embedding via Capturing the Healthcare Context. AAAI 2020: 833-840 - [c24]Yanghao Zhang, Wenjie Ruan, Fu Wang, Xiaowei Huang:
Generalizing Universal Adversarial Attacks Beyond Additive Perturbations. ICDM 2020: 1412-1417 - [c23]Shuohan Liu, Yue Cao
, Wenjie Ruan
, Qiang Ni
, Michele Nati
, Chakkaphong Suthaputchakun:
EV Charging Recommendation Concerning Preemptive Service and Charging Urgency Policy. VTC Fall 2020: 1-5 - [i10]Liantao Ma, Xinyu Ma, Junyi Gao, Chaohe Zhang, Zhihao Yu, Xianfeng Jiao, Wenjie Ruan, Yasha Wang, Wen Tang, Jiangtao Wang:
CovidCare: Transferring Knowledge from Existing EMR to Emerging Epidemic for Interpretable Prognosis. CoRR abs/2007.08848 (2020) - [i9]Peipei Xu, Wenjie Ruan, Xiaowei Huang:
Towards the Quantification of Safety Risks in Deep Neural Networks. CoRR abs/2009.06114 (2020) - [i8]Han Wu, Wenjie Ruan, Jiangtao Wang, Dingchang Zheng, Shaolin Li, Jian Chen, Kunwei Li, Xiangfei Chai, Sumi Helal:
Interpretable Machine Learning for COVID-19: An Empirical Study on Severity Prediction Task. CoRR abs/2010.02006 (2020) - [i7]Yanghao Zhang
, Wenjie Ruan, Fu Wang, Xiaowei Huang:
Generalizing Universal Adversarial Attacks Beyond Additive Perturbations. CoRR abs/2010.07788 (2020)
2010 – 2019
- 2019
- [c22]Wenjie Ruan
, Min Wu, Youcheng Sun
, Xiaowei Huang, Daniel Kroening, Marta Kwiatkowska:
Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the Hamming Distance. IJCAI 2019: 5944-5952 - [c21]Min Wu, Tyron Louw
, Morteza Lahijanian, Wenjie Ruan
, Xiaowei Huang, Natasha Merat, Marta Kwiatkowska:
Gaze-based Intention Anticipation over Driving Manoeuvres in Semi-Autonomous Vehicles. IROS 2019: 6210-6216 - [i6]Liantao Ma, Junyi Gao, Yasha Wang, Chaohe Zhang, Jiangtao Wang, Wenjie Ruan, Wen Tang, Xin Gao, Xinyu Ma:
AdaCare: Explainable Clinical Health Status Representation Learning via Scale-Adaptive Feature Extraction and Recalibration. CoRR abs/1911.12205 (2019) - [i5]Liantao Ma, Chaohe Zhang, Yasha Wang, Wenjie Ruan, Jiantao Wang, Wen Tang, Xinyu Ma, Xin Gao, Junyi Gao:
ConCare: Personalized Clinical Feature Embedding via Capturing the Healthcare Context. CoRR abs/1911.12216 (2019) - 2018
- [j6]Wenjie Ruan
, Quan Z. Sheng
, Lina Yao, Xue Li, Nickolas J. G. Falkner, Lei Yang
:
Device-free human localization and tracking with UHF passive RFID tags: A data-driven approach. J. Netw. Comput. Appl. 104: 78-96 (2018) - [j5]Feng Zhou
, Hui Peng, Wenjie Ruan
, Dan Wang, Mingyue Liu, Yunfeng Gu, Li Li:
Cubic-RBF-ARX modeling and model-based optimal setting control in head and tail stages of cut tobacco drying process. Neural Comput. Appl. 30(4): 1039-1053 (2018) - [j4]Lina Yao, Quan Z. Sheng
, Xue Li, Tao Gu
, Mingkui Tan, Xianzhi Wang
, Sen Wang, Wenjie Ruan
:
Compressive Representation for Device-Free Activity Recognition with Passive RFID Signal Strength. IEEE Trans. Mob. Comput. 17(2): 293-306 (2018) - [j3]Wenjie Ruan
, Quan Z. Sheng
, Peipei Xu, Lei Yang
, Tao Gu
, Longfei Shangguan:
Making Sense of Doppler Effect for Multi-Modal Hand Motion Detection. IEEE Trans. Mob. Comput. 17(9): 2087-2100 (2018) - [j2]Wei Emma Zhang
, Quan Z. Sheng
, Jey Han Lau, Ermyas Abebe, Wenjie Ruan:
Duplicate Detection in Programming Question Answering Communities. ACM Trans. Internet Techn. 18(3): 37:1-37:21 (2018) - [c20]Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska:
Reachability Analysis of Deep Neural Networks with Provable Guarantees. IJCAI 2018: 2651-2659 - [c19]Youcheng Sun
, Min Wu, Wenjie Ruan
, Xiaowei Huang, Marta Kwiatkowska, Daniel Kroening
:
Concolic testing for deep neural networks. ASE 2018: 109-119 - [c18]Wei Emma Zhang
, Quan Z. Sheng
, Zhejun Tang, Wenjie Ruan
:
Related or Duplicate: Distinguishing Similar CQA Questions via Convolutional Neural Networks. SIGIR 2018: 1153-1156 - [i4]Wenjie Ruan, Min Wu, Youcheng Sun, Xiaowei Huang, Daniel Kroening, Marta Kwiatkowska:
Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for L0 Norm. CoRR abs/1804.05805 (2018) - [i3]Youcheng Sun, Min Wu, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska, Daniel Kroening:
Concolic Testing for Deep Neural Networks. CoRR abs/1805.00089 (2018) - [i2]Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska:
Reachability Analysis of Deep Neural Networks with Provable Guarantees. CoRR abs/1805.02242 (2018) - [i1]Min Wu, Matthew Wicker, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska:
A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees. CoRR abs/1807.03571 (2018) - 2017
- [c17]Abdullah Alfazi, Quan Z. Sheng
, Ali Babar, Wenjie Ruan
, Yongrui Qin:
Toward Unified Cloud Service Discovery for Enhanced Service Identification. ASSRI 2017: 149-163 - [c16]Wenjie Ruan
, Peipei Xu, Quan Z. Sheng
, Nickolas J. G. Falkner, Xue Li, Wei Emma Zhang
:
Recovering Missing Values from Corrupted Spatio-Temporal Sensory Data via Robust Low-Rank Tensor Completion. DASFAA (1) 2017: 607-622 - [c15]Peipei Xu, Wenjie Ruan
, Quan Z. Sheng
, Tao Gu
, Lina Yao:
Interpolating the Missing Values for Multi-Dimensional Spatial-Temporal Sensor Data: A Tensor SVD Approach. MobiQuitous 2017: 442-451 - 2016
- [c14]Wenjie Ruan
, Leon Chea, Quan Z. Sheng
, Lina Yao:
Recognizing Daily Living Activity Using Embedded Sensors in Smartphones: A Data-Driven Approach. ADMA 2016: 250-265 - [c13]Wenjie Ruan
, Quan Z. Sheng
, Peipei Xu, Nguyen Khoi Tran
, Nickolas J. G. Falkner, Xue Li, Wei Emma Zhang
:
Forecasting Seasonal Time Series Using Weighted Gradient RBF Network based Autoregressive Model. CIKM 2016: 2021-2024 - [c12]Wenjie Ruan
, Peipei Xu, Quan Z. Sheng
, Nguyen Khoi Tran
, Nickolas J. G. Falkner, Xue Li, Wei Emma Zhang
:
When Sensor Meets Tensor: Filling Missing Sensor Values Through a Tensor Approach. CIKM 2016: 2025-2028 - [c11]Wenjie Ruan
, Quan Z. Sheng
, Lei Yang
, Tao Gu
, Peipei Xu, Longfei Shangguan:
AudioGest: enabling fine-grained hand gesture detection by decoding echo signal. UbiComp 2016: 474-485 - [c10]Wenjie Ruan
:
Unobtrusive human localization and activity recognition for supporting independent living of the elderly. PerCom Workshops 2016: 1-3 - [c9]Wenjie Ruan
, Quan Z. Sheng
, Lina Yao, Nguyen Khoi Tran
, Yu Chieh Yang:
PreventDark: Automatically detecting and preventing problematic use of smartphones in darkness. PerCom Workshops 2016: 1-3 - [c8]Wenjie Ruan
, Quan Z. Sheng
, Lina Yao, Lei Yang, Tao Gu:
HOI-Loc: Towards unobstructive human localization with probabilistic multi-sensor fusion. PerCom Workshops 2016: 1-4 - [c7]Wenjie Ruan
, Quan Z. Sheng
, Lina Yao, Tao Gu, Michele Ruta
, Longfei Shangguan:
Device-free indoor localization and tracking through Human-Object Interactions. WoWMoM 2016: 1-9 - 2015
- [j1]Lina Yao, Quan Z. Sheng
, Wenjie Ruan
, Tao Gu
, Xue Li, Nick Falkner, Zhi Yang:
RF-Care: Device-Free Posture Recognition for Elderly People Using A Passive RFID Tag Array. EAI Endorsed Trans. Ambient Syst. 2(6): e2 (2015) - [c6]Lina Yao, Quan Z. Sheng
, Xue Li, Sen Wang, Tao Gu
, Wenjie Ruan
, Wan Zou:
Freedom: Online Activity Recognition via Dictionary-Based Sparse Representation of RFID Sensing Data. ICDM 2015: 1087-1092 - [c5]Lina Yao, Quan Z. Sheng
, Wenjie Ruan
, Xue Li, Sen Wang, Zhi Yang:
Unobtrusive Posture Recognition via Online Learning of Multi-dimensional RFID Received Signal Strength. ICPADS 2015: 116-123 - [c4]Lina Yao, Xianzhi Wang
, Quan Z. Sheng
, Wenjie Ruan
, Wei Zhang
:
Service Recommendation for Mashup Composition with Implicit Correlation Regularization. ICWS 2015: 217-224 - [c3]Wenjie Ruan, Lina Yao, Quan Z. Sheng
, Nickolas J. G. Falkner, Xue Li, Tao Gu
:
TagFall: Towards Unobstructive Fine-Grained Fall Detection based on UHF Passive RFID Tags. MobiQuitous 2015: 140-149 - 2014
- [c2]Lina Yao, Wenjie Ruan
, Quan Z. Sheng
, Xue Li, Nickolas J. G. Falkner:
Exploring Tag-Free RFID-Based Passive Localization and Tracking via Learning-Based Probabilistic Approaches. CIKM 2014: 1799-1802 - [c1]Wenjie Ruan
, Lina Yao, Quan Z. Sheng
, Nickolas J. G. Falkner, Xue Li:
TagTrack: device-free localization and tracking using passive RFID tags. MobiQuitous 2014: 80-89
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-11 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint