default search action
Wenya Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Le Dong, Danxun Zhang, Wenya Li, Wenling Wu:
Yoyo attack on 4-round Lai-Massey scheme with secret round functions. Des. Codes Cryptogr. 92(9): 2655-2684 (2024) - [j9]Wenya Li, Kai Zhang, Bin Hu:
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers. IET Inf. Secur. 2024: 1-14 (2024) - [j8]Jinchang Hu, Xin Wang, Wenya Li, Chenjing Yang, Yitong Zhao:
Picking scheduling for single picker to multi-workstations of the part-to-picker order fulfilment system. RAIRO Oper. Res. 58(1): 535-555 (2024) - [j7]Changyi Xu, Wenya Li, Ying Zhao:
A Novel Fused NARX-Driven Digital Twin Model for Aeroengine Gas Path Parameter Prediction. IEEE Trans. Ind. Informatics 20(4): 6280-6288 (2024) - 2023
- [j6]Yaolin Zhu, Ran Liu, Gang Hu, Xin Chen, Wenya Li:
Accurate identification of cashmere and wool fibers based on enhanced ShuffleNetV2 and transfer learning. J. Big Data 10(1): 152 (2023) - [j5]Yiteng Zhang, Lei Li, Lianghai Xie, Linggao Kong, Wenya Li, Binbin Tang, Jijie Ma, Aibing Zhang:
Inversion of Upstream Solar Wind Parameters from ENA Observations at Mars. Remote. Sens. 15(7): 1721 (2023) - 2022
- [j4]Wenya Li, C. Karthik, M. Rajalakshmi:
Big data visualization for in-situ data exploration for sportsperson. Comput. Electr. Eng. 99: 107829 (2022) - [j3]Yaolin Zhu, Huang JiaYI, Yunhong Li, Wenya Li:
Image identification of cashmere and wool fibers based on the improved Xception network. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9301-9310 (2022) - [j2]Qiyue Li, Wenya Li, Geying Lai, Ying Liu, Adam Thomas Devlin, Weiping Wang, Shupin Zhan:
Identifying High Stranding Risk Areas of the Yangtze Finless Porpoise via Remote Sensing and Hydrodynamic Modeling. Remote. Sens. 14(10): 2455 (2022) - [c9]Wenya Li, Xiaofei Zhou, Xu Bai, Shirui Pan:
Improving Factual Consistency of Dialogue Summarization with Fact-Augmentation Mechanism. IJCNN 2022: 1-7 - 2021
- [c8]Wenya Li, Min Wu, Xiaoyan Huang, Zhaokai Li:
Improved High Frequency Signal Injection Method Based on Fundamental Current Extraction for Permanent Magnetic Synchronous Motors. ISIE 2021: 1-6 - 2020
- [c7]Yan Yan, Wenya Li, Guanhua Chen, Wei Liu:
An improved text classification method based on convolutional neural networks. CCRIS 2020: 185-190
2010 – 2019
- 2019
- [j1]Hui Li, Wei Jiang, Wenya Li:
Space-time spectral method for the Cattaneo equation with time fractional derivative. Appl. Math. Comput. 349: 325-336 (2019) - 2018
- [c6]Jingjie Teng, Zhaoning Zhang, Wenya Li, Kexuan Liu, Yan Kang:
Longitudinal Collision Risk Assessment of Closely Spaced Parallel Runways Paired Approach. ADHIP 2018: 416-424 - [c5]Zhaoning Zhang, Kexuan Liu, Fei Lu, Wenya Li:
Short-Term Traffic Flow Prediction of Airspace Sectors Based on Multiple Time Series Learning Mechanism. ADHIP 2018: 425-432 - [c4]Fei Lu, Wenya Li, Zhaoning Zhang, Kexuan Liu:
Study on Civil Aviation Unsafe Incident Prediction Based on Markov Optimization. ADHIP 2018: 524-534 - 2012
- [c3]Hongbing Wang, Wenya Li, Xuan Zhou:
Automatic Discovery and Transfer of MAXQ Hierarchies in a Complex System. ICTAI 2012: 1157-1162 - 2010
- [c2]Hongbing Wang, Xuan Zhou, Xiang Zhou, Weihong Liu, Wenya Li, Athman Bouguettaya:
Adaptive Service Composition Based on Reinforcement Learning. ICSOC 2010: 92-107 - [c1]Hongbing Wang, Xuan Zhou, Xiang Zhou, Weihong Liu, Wenya Li:
Adaptive and Dynamic Service Composition Using Q-Learning. ICTAI (1) 2010: 145-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint