default search action
Wenbin Chen 0003
Person information
- affiliation: Guangzhou University, School of Computer Science, China
- affiliation (PhD 2010): North Carolina State University, Raleigh, NC, USA
Other persons with the same name
- Wenbin Chen (aka: Wen-Bin Chen) — disambiguation page
- Wenbin Chen 0001 — West Virginia University, Morgantown, Department of Computer Science and Electrical Engineering
- Wenbin Chen 0002 — Nanjing University of Aeronautics and Astronautics, Department of Computer Science
- Wenbin Chen 0004 — North University of China, Shanxi Provincial Key Laboratory for Biomedical Imaging and Big Data, Taiyuan, China
- Wenbin Chen 0005 (aka: Wen-Bin Chen 0005) — Huazhong University of Science and Technology, Wuhan, China
- Wenbin Chen 0006 — Fudan University, Shanghai Key Laboratory for Contemporary Applied Mathematics, School of Mathematical Sciences, Shanghai, China
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Ke Qi, Wenhao Xu, Wenbin Chen, Xi Tao, Peijia Chen:
Multiple object tracking with segmentation and interactive multiple model. J. Vis. Commun. Image Represent. 99: 104064 (2024) - 2023
- [c16]Shukai Zheng, Miao Liu, Ligang Zheng, Wenbin Chen:
Facial Expression Recognition with Global Multiscale and Local Attention Network. CGI (1) 2023: 403-414 - [c15]Yiwei Wu, Ke Qi, Wenbin Chen, Jingdong Zhang, Yutao Qi:
Template Shift and Background Suppression for Visual Object Tracking. KSEM (2) 2023: 188-200 - 2022
- [j21]Wenbin Chen, Jianer Chen:
Approximating Closest Vector Problem in ℓ∞-Norm Revisited. Comput. J. 65(12): 3100-3105 (2022) - [c14]Zhefeng Zhu, Ke Qi, Yicong Zhou, Wenbin Chen, Jingdong Zhang:
More Efficient and Locally Enhanced Transformer. ICONIP (5) 2022: 86-97 - [c13]Shunyu Yao, Ke Qi, Wenbin Chen, Yicong Zhou:
Richer Information Transformer for Object Detection. MLNLP 2022: 110-114 - [c12]Yuxiang Sun, Ke Qi, Wenbin Chen, Wei Xiong, Peiyue Li, Zhuxian Liu:
Fusional Modality and Distribution Alignment Learning for Visible-Infrared Person Re-Identification. SMC 2022: 3242-3248 - 2021
- [j20]Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siu-Ming Yiu, Zoe Lin Jiang:
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J. Comput. Syst. Sci. 120: 137-148 (2021) - [j19]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan:
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1543-1550 (2021) - [j18]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan:
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1551 (2021) - [c11]Wenkang Li, Ke Qi, Wenbin Chen, Yicong Zhou:
Unified Batch All Triplet Loss for Visible-Infrared Person Re-identification. IJCNN 2021: 1-8 - [c10]Peiyan Wu, Wenbin Chen, Hualin Wu, Ke Qi, Miao Liu:
Enhanced Game Theoretical Spectrum Sharing Method Based on Blockchain Consensus. VTC Fall 2021: 1-7 - [i4]Wenkang Li, Ke Qi, Wenbin Chen, Yicong Zhou:
Unified Batch All Triplet Loss for Visible-Infrared Person Re-identification. CoRR abs/2103.04607 (2021) - [i3]Wenkang Li, Qi Ke, Wenbin Chen, Yicong Zhou:
Bridging the Distribution Gap of Visible-Infrared Person Re-identification with Modality Batch Normalization. CoRR abs/2103.04778 (2021) - 2020
- [c9]Wenbin Chen, Fufang Li, Ke Qi, Miao Liu, Maobin Tang:
A Primal-Dual Randomized Algorithm for the Online Weighted Set Multi-cover Problem. TAMC 2020: 60-68
2010 – 2019
- 2019
- [j17]Miao Liu, Boyu Zhang, Wenbin Chen, Xunlai Zhang:
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities. IEEE Access 7: 182004-182016 (2019) - [j16]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j15]Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang:
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. Inf. Sci. 471: 201-215 (2019) - [j14]Zhengan Huang, Junzuo Lai, Wenbin Chen, Muhammad Raees-ul-Haq, Liaoliang Jiang:
Practical public key encryption with selective opening security for receivers. Inf. Sci. 478: 15-27 (2019) - [c8]Wenbin Chen, Jianer Chen:
Approximating Closest Vector Problem in ℓ∞ Norm Revisited. AAIM 2019: 42-50 - 2018
- [j13]Qun Lin, Jin Li, Zhengan Huang, Wenbin Chen, Jian Shen:
A Short Linearly Homomorphic Proxy Signature Scheme. IEEE Access 6: 12966-12972 (2018) - [j12]Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang:
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access 6: 20632-20640 (2018) - [j11]Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:
Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 21(1): 277-286 (2018) - [j10]Tong Li, Wenbin Chen, Yi Tang, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. Secur. Commun. Networks 2018: 9641273:1-9641273:6 (2018) - [c7]Fufang Li, Binbin Li, Lingxi Peng, Wenbin Chen, Ligang Zheng, Kefu Xu:
A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1. ICCCS (6) 2018: 312-322 - [c6]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [i2]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i1]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - 2017
- [j9]Wenbin Chen, William Hendrix, Nagiza F. Samatova:
The Application of the Weighted k-Partite Graph Problem to the Multiple Alignment for Metabolic Pathways. J. Comput. Biol. 24(12): 1195-1211 (2017) - [j8]Wenbin Chen, Fufang Li, Jianxiong Wang, Ke Qi, Maobin Tang, Xiuni Wang:
A primal-dual online algorithm for the k-server problem on weighted HSTs. J. Comb. Optim. 34(4): 1133-1146 (2017) - [c5]Wenbin Chen, Hao Lei, Jin Li, Chongzhi Gao, Fufang Li, Ke Qi:
A Multi-source Homomorphic Network Coding Signature in the Standard Model. GPC 2017: 66-74 - 2016
- [j7]Lingxi Peng, Wenbin Chen, Wubai Zhou, Fufang Li, Jin Yang, Jiandong Zhang:
An immune-inspired semi-supervised algorithm for breast cancer diagnosis. Comput. Methods Programs Biomed. 134: 259-265 (2016) - [j6]Wenbin Chen, Nagiza F. Samatova, Matthias F. Stallmann, William Hendrix, Weiqin Ying:
On size-constrained minimum s-t cut problems and size-constrained dense subgraph problems. Theor. Comput. Sci. 609: 434-442 (2016) - [j5]Wenbin Chen, Hao Lei, Ke Qi:
Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634: 47-54 (2016) - 2015
- [c4]Wenbin Chen, Lingxi Peng, Jianxiong Wang, Fufang Li, Maobin Tang:
Algorithms for the Densest Subgraph with at Least k Vertices and with a Specified Subset. COCOA 2015: 566-573 - 2013
- [j4]Wenbin Chen, Lingxi Peng, Jianxiong Wang, Fufang Li, Maobin Tang, Wei Xiong, Songtao Wang:
Inapproximability results for the minimum integral solution problem with preprocessing over ℓ∞ℓ∞ norm. Theor. Comput. Sci. 478: 127-131 (2013) - 2012
- [j3]Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:
An Immune-inspired Adaptive Automated Intrusion Response System Model. Int. J. Comput. Intell. Syst. 5(5): 808-815 (2012) - 2011
- [j2]Wenbin Chen, Matthew C. Schmidt, Nagiza F. Samatova:
On the parameterized complexity of the Multi-MCT and Multi-MCST problems. J. Comb. Optim. 21(2): 151-158 (2011) - 2010
- [c3]Wenhong Tian, Matthew C. Schmidt, Wenbin Chen, Nagiza F. Samatova:
Multiple Alignment of Large Interaction Networks by Fast Identifying Maximal Conserved Patterns. BIOCOMP 2010: 178-184 - [c2]Wenbin Chen, Andrea M. Rocha, William Hendrix, Matthew C. Schmidt, Nagiza F. Samatova:
The Multiple Alignment Algorithm for Metabolic Pathways without Abstraction. ICDM Workshops 2010: 669-678
2000 – 2009
- 2009
- [j1]Wenbin Chen, Matthew C. Schmidt, Nagiza F. Samatova:
On parameterized complexity of the Multi-MCS problem. Theor. Comput. Sci. 410(21-23): 2024-2032 (2009) - [c1]Wenbin Chen, Matthew C. Schmidt, Wenhong Tian, Nagiza F. Samatova:
A Fast, Accurate Algorithm for Identifying Functional Modules Through Pairwise Local Alignment of Protein Interaction Networks. BIOCOMP 2009: 816-821
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint