default search action
Yingwen Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yingwen Chen 0001 (aka: YingWen Chen 0001) — National University of Defense Technology, College of Computer, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c16]Yingwen Chen, Yuting Wei, Deming Pang, Guangtao Xue:
A Deep Learning Approach Based on Continuous Wavelet Transform Towards Fall Detection. WASA (2) 2022: 206-217 - 2020
- [c15]Linghang Meng, Xueshu Hong, Yingwen Chen, Yuke Ding, Cheng-Zhuo Zhang:
K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data. WASA (1) 2020: 381-393
2010 – 2019
- 2019
- [j9]Geyao Cheng, Yang Guo, Yingwen Chen, Yudong Qin:
Designating City-Wide Collaborative Geofence Sites for Renting and Returning Dock-Less Shared Bikes. IEEE Access 7: 35596-35605 (2019) - 2018
- [j8]Baoyao Wang, Peidong Zhu, Yingwen Chen, Peng Xun, Zhenyu Zhang:
False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid. Symmetry 10(5): 165 (2018) - [c14]Ying-Wen Chen, Tien-Hong Lo, Hsiu-Jui Chang, Wei-Cheng Chao, Berlin Chen:
會議語音辨識使用語者資訊之語言模型調適技術 (On the Use of Speaker-Aware Language Model Adaptation Techniques for Meeting Speech Recognition ) [In Chinese]. ROCLING 2018: 46-60 - [c13]Yifan Dong, Peidong Zhu, Qiang Liu, Yingwen Chen, Peng Xun:
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. WASA 2018: 90-102 - [c12]Yiqi Wang, En Zhu, Qiang Liu, Yingwen Chen, Jianping Yin:
Exploration of Human Activities Using Sensing Data via Deep Embedded Determination. WASA 2018: 473-484 - 2017
- [j7]Tien-Hong Lo, Ying-Wen Chen, Kuan-Yu Chen, Hsin-Min Wang, Berlin Chen:
On the Use of Neural Network Modeling Techniques for Spoken Document Retrieval. Int. J. Comput. Linguistics Chin. Lang. Process. 22(2) (2017) - [j6]Ping Zhong, Ya-Ting Li, Weirong Liu, Guihua Duan, Ying-Wen Chen, Neal N. Xiong:
Joint Mobile Data Collection and Wireless Energy Transfer in Wireless Rechargeable Sensor Networks. Sensors 17(8): 1881 (2017) - [c11]Tien-Hong Lo, Ying-Wen Chen, Kuan-Yu Chen, Hsin-Min Wang, Berlin Chen:
Neural relevance-aware query modeling for spoken document retrieval. ASRU 2017: 466-473 - [c10]Ying-Wen Chen, Kuan-Yu Chen, Hsin-Min Wang, Berlin Chen:
Exploring the Use of Significant Words Language Modeling for Spoken Document Retrieval. INTERSPEECH 2017: 2889-2893 - [c9]Tien-Hong Lo, Ying-Wen Chen, Berlin Chen, Kuan-Yu Chen, Hsin-Min Wang:
使用查詢意向探索與類神經網路於語音文件檢索之研究 (Exploring Query Intent and Neural Network modeling Techniques for Spoken Document Retrieval) [In Chinese]. ROCLING 2017: 149-151 - 2016
- [j5]Ming-Han Yang, Yao-Chi Hsu, Hsiao-Tsung Hung, Ying-Wen Chen, Kuan-Yu Chen, Berlin Chen:
Leveraging Multi-Task Learning with Neural Network Based Acoustic Modeling for Improved Meeting Speech Recognition. Int. J. Comput. Linguistics Chin. Lang. Process. 21(2) (2016) - [c8]Ming-Han Yang, Yao-Chi Hsu, Hsiao-Tsung Hung, Ying-Wen Chen, Berlin Chen, Kuan-Yu Chen:
融合多任務學習類神經網路聲學模型訓練於會議語音辨識之研究(Leveraging Multi-task Learning with Neural Network Based Acoustic Modeling for Improved Meeting Speech Recognition) [In Chinese]. ROCLING 2016 - 2015
- [j4]Xiumei Fan, Chao Wang, Jiguo Yu, Kai Xing, Yingwen Chen, Jiawei Liang:
A Reliable Broadcast Protocol in Vehicular Ad Hoc Networks. Int. J. Distributed Sens. Networks 11: 286241:1-286241:14 (2015) - [j3]Hongjuan Li, Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen:
Secure friend discovery based on encounter history in mobile social networks. Pers. Ubiquitous Comput. 19(7): 999-1009 (2015) - [c7]Chao Wang, Yingwen Chen, Xiuzhen Cheng, Xiumei Fan:
Ads dissemination in Vehicular Ad Hoc Networks. ICC 2015: 3640-3645 - 2014
- [c6]Hongjuan Li, Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen:
Secure Friend Discovery Based on Encounter History in Mobile Social Networks. IIKI 2014: 280-285 - [c5]Chao Wang, Xiumei Fan, Jiguo Yu, Kai Xing, Yingwen Chen, Jiawei Liang:
S-Disjunct Code Based MAC Protocol for Reliable Broadcast in Vehicular Ad Hoc Networks. IIKI 2014: 291-296 - [c4]Chao Wang, Maya Larson, Yingwen Chen, Xiumei Fan:
Schedule Algorithms for File Transmission in Vehicular Ad Hoc Networks. WASA 2014: 126-137
2000 – 2009
- 2008
- [j2]Kai Du, Zhengbing Hu, Huaimin Wang, Yingwen Chen, Shuqiang Yang, Zhijian Yuan:
Reliability Design for Large Scale Data Warehouses. J. Comput. 3(10): 78-85 (2008) - [j1]Le Wang, Yan Jia, Yingwen Chen:
Conversation Extraction in Dynamic Text Message Stream. J. Comput. 3(10): 86-93 (2008) - [c3]Zhijian Yuan, Yingwen Chen, Yan Jia, Shuqiang Yang:
Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter. CIS (1) 2008: 290-294 - [c2]Kai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen:
Reliability Design for Large Scale Storage Systems. HASE 2008: 463-466 - [c1]Le Wang, Yingwen Chen, Yan Jia:
Toward Public Opinions Detection: Measuring the Similarity between Instant Messages. ODBIS 2008: 21-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint