default search action
Wenju Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Xubin Wang, Wenju Li, Xiangjian He:
MTDiff: Visual anomaly detection with multi-scale diffusion models. Knowl. Based Syst. 302: 112364 (2024) - [j6]Wenju Li, Yue Ma, Keyong Shao, Zhengkun Yi, Wujing Cao, Meng Yin, Tiantian Xu, Xinyu Wu:
The Human-Machine Interface Design Based on sEMG and Motor Imagery EEG for Lower Limb Exoskeleton Assistance System. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - 2023
- [j5]Keyong Shao, Ao Feng, Tingting Wang, Wenju Li, Jilu Jiang:
Finite-time sliding mode synchronisation of a fractional-order hyperchaotic system optimised using a differential evolution algorithm with dual neural networks. IET Networks 12(3): 87-97 (2023) - [c18]Chuanyu Zong, Ziyi Cai, Wenju Li, Tao Qiu, Jiajia Li, Xiufeng Xia:
Continuous Complex Relational Community Detection on Multi-layer Networks. ISPA/BDCloud/SocialCom/SustainCom 2023: 628-633 - [c17]Lijun Yang, Kui Xiang, Muye Pang, Mingxiang Luo, Meng Yin, Wenju Li, Wujing Cao:
An Autoencoder-Based Feature Extraction Method Applied to the Detection of Lateral Walking Gait Phase. ICIRA (7) 2023: 111-120 - 2022
- [c16]Wenju Li, Keyong Shao, Chi Zhu, Yue Ma, Wujing Cao, Meng Yin, Lijun Yang, Mingxiang Luo, Xinyu Wu:
Preliminary study of online real-time control system for lower extremity exoskeletons based on EEG and sEMG fusion. ROBIO 2022: 1689-1694
2010 – 2019
- 2019
- [j4]Kaixue Ma, Yongqiang Wang, Wenju Li, Yinzhou Chen:
A Novel Compact Self-Packaged SPDT Switchable BPFs Based on SISL Platform. IEEE Trans. Ind. Electron. 66(9): 7239-7249 (2019) - [c15]Tianzhen Dong, Xiao Qi, Qing Zhang, Wenju Li, Liang Xiong:
Overview on Vision-Based 3D Object Recognition Methods. ICIG (2) 2019: 243-254 - [c14]Wenju Li, Zihao Shen, Peigang Li:
Crack Detection of Track Plate Based on YOLO. ISCID (2) 2019: 15-18 - 2018
- [j3]Qing Zhang, Jiajun Lin, Wenju Li, Yanjiao Shi, Guogang Cao:
Salient object detection via compactness and objectness cues. Vis. Comput. 34(4): 473-489 (2018) - [c13]Tianzhen Dong, Mingyang Qin, Wenju Li, Xiao Qi:
An Anti-Blocking Particle Filter Tracking Algorithm. ISCID (1) 2018: 61-64 - [c12]Wenju Li, Wenkang Hu, Tianzhen Dong, Jiantao Qu:
Depth Image Enhancement Algorithm Based on RGB Image Fusion. ISCID (2) 2018: 111-114 - [c11]Guogang Cao, Cong Cao, Qing Zhang, Wenju Li:
Differential Evolution Improved with Intelligent Mutation Operator Based on Proximity and Ranking. ISCID (2) 2018: 196-201 - [c10]Tianzhen Dong, Xiao Qi, Wenju Li, Mingyang Qin:
Target Feature Recognition Based on Wavelet Transform and CNN-SVM. ISCID (1) 2018: 347-350 - [c9]Wenju Li, Meng Zhang, Zihao Shen, Wenkang Hu, Peigang Li:
Track Crack Detection Method in Complex Environment. ISCID (1) 2018: 356-359 - 2017
- [j2]Qing Zhang, Jiajun Lin, Yanyun Tao, Wenju Li, Yanjiao Shi:
Salient object detection via color and texture cues. Neurocomputing 243: 35-48 (2017) - [c8]Qing Zhang, Desi Luo, Wenju Li, Yanjiao Shi, Jiajun Lin:
Two-stage absorbing Markov chain for salient object detection. ICIP 2017: 895-899 - [c7]Wenju Li, Qi Chen, Tianzhen Dong, Lihua Wei, Qing Zhang:
Traffic Signs Classification Based on Local Characteristics and ELM. ISCID (1) 2017: 127-130 - [c6]Tianzhen Dong, Mingyang Qin, Wenju Li, Lanfeng Zhou, Xiao Qi:
Research of image segmentation based on theory of morphological connectivity. SPAC 2017: 335-339 - [c5]Wenju Li, Yunfan Lu, Jingyi Sun, Qi Chen, Tianzhen Dong, Lanfeng Zhou, Qing Zhang, Lihua Wei:
People counting based on improved gauss process regression. SPAC 2017: 603-608 - 2016
- [j1]Yanjiao Shi, Yunxiang Liu, Qing Zhang, Yugen Yi, Wenju Li:
Saliency-based abnormal event detection in crowded scenes. J. Electronic Imaging 25(6): 61608 (2016) - [c4]Wenju Li, Kaixue Ma, Shouxian Mou:
A Ku-band high-isolation SPDT switch in 0.35um SiGe BiCMOS technology. ISIC 2016: 1-4 - 2014
- [c3]Jiantao Yao, Wenju Li, Hongyu Zhang, Yundou Xu, Yongsheng Zhao:
Task-Oriented Design Method and Experimental Research of Six-Component Force Sensor. ICIRA (1) 2014: 1-12 - 2012
- [c2]Ben-xian Li, Meng-jun Li, Duo-Yong Sun, Jiang Li, Wenju Li:
Evaluation method for node importance based on node condensation in terrorism networks. ISI 2012: 193 - [c1]Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu:
A robust evaluation of terrorist network based on node-lap degree of triads. ISI 2012: 194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint