default search action
Liwen He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Liwen He, Yifan Li, Mingming Fan, Liang He, Yuhang Zhao:
A Multi-modal Toolkit to Support DIY Assistive Technology Creation for Blind and Low Vision People. UIST (Adjunct Volume) 2023: 3:1-3:3 - 2022
- [c11]Liwen He, Yun Wang, Hu Luo, Dangxiao Wang:
Vibrotactile Encoding of Object Features and Alert Levels for the Visually Impaired. AsiaHaptics 2022: 53-67 - 2021
- [j18]Bohan Chen, Zhuyin Shao, Zhexin Xie, Jiaqi Liu, Fei Pan, Liwen He, Li Zhang, Yanming Zhang, Xuechen Ling, Fujun Peng, Weidong Yun, Li Wen:
Soft Origami Gripper with Variable Effective Length. Adv. Intell. Syst. 3(10): 2000251 (2021) - [c10]Liwen He:
Research on Font Design and Communication Based on Computer Technology. CSIA (1) 2021: 746-753
2010 – 2019
- 2017
- [j17]Weifeng Lu, Li Yang, Siguang Chen, Liwen He:
Downlink Subcarriers Required Analysis for Two-Hop OFDMA Cellular System. Wirel. Pers. Commun. 95(2): 1811-1827 (2017) - [j16]Weifeng Lu, Siguang Chen, Liwen He:
Uplink Capacity of Two-Hop Relay TDD-CDMA Cellular Networks with Time-Slot Scheduling. Wirel. Pers. Commun. 97(1): 1345-1359 (2017) - 2016
- [j15]Liwen He, Feiyi Huang, Jie Zhang, Bin Liu, Chunling Chen, Zonghua Zhang, Yang Yang, Weifeng Lu:
Dynamic Secure Interconnection for Security Enhancement in Cloud Computing. Int. J. Comput. Commun. Control 11(3): 348-357 (2016) - [j14]Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li:
SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Secur. Commun. Networks 9(13): 1944-1957 (2016) - 2015
- [j13]Shaobai Zhang, Yanchun Ji, Liwen He:
Research on the mechanism for phonating stressed English syllables based on DIVA model. Neurocomputing 152: 11-18 (2015) - [j12]Xiangdong Chen, Liwen He, Gwanggil Jeon, Jechang Jeong:
Multidirectional Weighted Interpolation and Refinement Method for Bayer Pattern CFA Demosaicking. IEEE Trans. Circuits Syst. Video Technol. 25(8): 1271-1282 (2015) - [j11]Weifeng Lu, Jie Li, Liwen He:
A Novel Two-Hop-Relay WCDMA Cellular System with Queuing Buffer. Wirel. Pers. Commun. 81(3): 907-922 (2015) - [c9]Bin Liu, Jie Zhang, Kai-Kit Wong, Liwen He, Chengpeng Hao:
Low-latency near-capacity MIMO detection using parallel and hybrid QRD-MCMC algorithm. ChinaSIP 2015: 903-907 - [c8]Xiangdong Chen, Liwen He, Jiaye Tang, Young-Sup Lee:
A Low-Complexity Interpolation Method for Single-Sensor Camera Imaging with White-RGB Color Filter Array. SITIS 2015: 560-565 - 2014
- [j10]Qiang Zhou, Geng Yang, Liwen He:
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Xiangdong Chen, Gwanggil Jeon, Jechang Jeong, Liwen He:
Weighted interpolation filter incorporating local region statistics. J. Electronic Imaging 23(1): 013023 (2014) - [j8]Shiting Wen, Qing Li, Liwen He, An Liu, Jianwen Tao, Longjin Lv:
Towards Automatic Construction of Skyline Composite Services. J. Web Eng. 13(5&6): 361-377 (2014) - [j7]Qiang Zhou, Geng Yang, Liwen He:
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks. Sensors 14(4): 6701-6721 (2014) - 2013
- [j6]Liwen He, Yong Xu, Yan Chen, Jiajun Wen:
Recent Advance on mean Shift Tracking: a Survey. Int. J. Image Graph. 13(3) (2013) - 2010
- [c7]Xiaoming Lu, Weihua Cao, Xusheng Huang, Feiyi Huang, Liwen He, Wenhong Yang, Shaobin Wang, Xiaotong Zhang, Hongsong Chen:
A Real Implementation of DPI in 3G Network. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j5]Zonghua Zhang, Pin-Han Ho, Liwen He:
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. Comput. Secur. 28(7): 605-614 (2009) - [j4]Yiran Gao, Chris I. Phillips, Liwen He:
GA and PSO-based Resource Scheduling for Orchestrated, Distributed Computing. J. Digit. Inf. Manag. 7(6): 343-351 (2009) - [j3]Thomas M. Chen, Zhi Fu, Liwen He, Tim Strayer:
Recent developments in network intrusion detection [guest editorial]. IEEE Netw. 23(1): 4-5 (2009) - 2008
- [j2]Stamatios V. Kartalopoulos, Hsiao-Hwa Chen, Mário M. Freire, Liwen He, Pramode K. Verma:
Security in mobile ad hoc and sensor networks: part II [guest editorial]. IEEE Commun. Mag. 46(4): 86-87 (2008) - [c6]Liwen He, Paul Botham:
Pure MPLS Technology. ARES 2008: 253-259 - [c5]Yiran Gao, Chris I. Phillips, Liwen He:
DVM based Dynamic VPN Architecture for Group Working and Orchestrated Distributed Computing. ICDIM 2008: 763-768 - [c4]Jianyong Chen, Xiaomin Wang, Liwen He:
An Architecture for Differentiated Security Service. ISECS 2008: 301-304 - 2007
- [j1]Feiyi Huang, Yang Yang, Liwen He:
A flow-based network monitoring framework for wireless mesh networks. IEEE Wirel. Commun. 14(5): 48-55 (2007) - 2006
- [c3]Liwen He:
A Novel Scheme on Building a Trusted IP Routing Infrastructure. ICNS 2006: 13 - 2005
- [c2]Liwen He:
A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure. ICN (2) 2005: 463-470 - 2002
- [c1]Liwen He, Neil Mort:
Fitness Distance Correlation as a Measure of Genetic Algorithm Performances. IC-AI 2002: 920-926
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint