default search action
Jenhui Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Koduru Hajarathaiah, Murali Krishna Enduri, Satish Anamalamudi, Ashu Abdul, Jenhui Chen:
Node Significance Analysis in Complex Networks Using Machine Learning and Centrality Measures. IEEE Access 12: 10186-10201 (2024) - [j41]Srilatha Tokala, Murali Krishna Enduri, T. Jaya Lakshmi, Ashu Abdul, Jenhui Chen:
Empowering Quality of Recommendations by Integrating Matrix Factorization Approaches With Louvain Community Detection. IEEE Access 12: 164028-164062 (2024) - [j40]Ernest Ntizikira, Lei Wang, Jenhui Chen, Xinxin Lu:
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT. Clust. Comput. 27(7): 10025-10051 (2024) - [j39]Ashu Abdul, Binghong Chen, Siginamsetty Phani, Jenhui Chen:
Improving preliminary clinical diagnosis accuracy through knowledge filtering techniques in consultation dialogues. Comput. Methods Programs Biomed. 246: 108051 (2024) - [j38]Ernest Ntizikira, Lei Wang, Jenhui Chen, Kiran Saleem:
Honey-block: Edge assisted ensemble learning model for intrusion detection and prevention using defense mechanism in IoT. Comput. Commun. 214: 1-17 (2024) - [j37]Muhammad Ali Lodhi, Mohammad S. Obaidat, Lei Wang, Khalid Mahmood, Khalid Ibrahim Qureshi, Jenhui Chen, Kuei-Fang Hsiao:
Tiny Machine Learning for Efficient Channel Selection in LoRaWAN. IEEE Internet Things J. 11(19): 30714-30724 (2024) - [j36]Yueh-Shen Tu, Yu-Shian Shen, Yuk Yii Chan, Lei Wang, Jenhui Chen:
Violent Video Recognition by Using Sequential Image Collage. Sensors 24(6): 1844 (2024) - [j35]Zhiqun Hu, Fukun Yang, Zhaoming Lu, Jenhui Chen:
Enhancing Autonomous Lane-Changing Safety: Deep Reinforcement Learning via Pre-Exploration in Parallel Imaginary Environments. IEEE Trans. Ind. Informatics 20(10): 12385-12395 (2024) - 2023
- [j34]Obinna Agbodike, Jenhui Chen:
Restoring Snow-Degraded Single Images With Wavelet in Vision Transformer. IEEE Access 11: 99470-99480 (2023) - [j33]Zhiqun Hu, Yujing Zhang, Hao Huang, Xiangming Wen, Obinna Agbodike, Jenhui Chen:
Reinforcement learning for energy efficiency improvement in UAV-BS access networks: A knowledge transfer scheme. Eng. Appl. Artif. Intell. 120: 105930 (2023) - [j32]Obinna Agbodike, Weijin Zhang, Jenhui Chen, Lei Wang:
Face and body-shape integration model for cloth-changing person re-identification. Image Vis. Comput. 140: 104843 (2023) - [j31]Hairui Yang, Baoli Sun, Baopu Li, Caifei Yang, Zhihui Wang, Jenhui Chen, Lei Wang, Haojie Li:
Iterative Class Prototype Calibration for Transductive Zero-Shot Learning. IEEE Trans. Circuits Syst. Video Technol. 33(3): 1236-1246 (2023) - 2022
- [j30]Jian Fang, Lei Wang, Zhenquan Qin, Bingxian Lu, Wenbo Zhao, Yixuan Hou, Jenhui Chen:
A Lightweight Passive Human Tracking Method Using Wi-Fi. Sensors 22(2): 541 (2022) - [e3]Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu:
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13471, Springer 2022, ISBN 978-3-031-19207-4 [contents] - [e2]Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu:
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13472, Springer 2022, ISBN 978-3-031-19213-5 [contents] - [e1]Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu:
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13473, Springer 2022, ISBN 978-3-031-19210-4 [contents] - 2021
- [j29]Muhammad Ibrar, Lei Wang, Gabriel-Miro Muntean, Jenhui Chen, Nadir Shah, Aamir Akbar:
IHSF: An Intelligent Solution for Improved Performance of Reliable and Time-Sensitive Flows in Hybrid SDN-Based FC IoT Systems. IEEE Internet Things J. 8(5): 3130-3142 (2021) - 2020
- [j28]Jenhui Chen, Ray-Guang Cheng, Obinna Agbodike, Yu-Syuan Lyu:
A Dynamic Backoff Window Scheme for Machine-Type Communications in Cyber-Physical Systems. IEEE Access 8: 31045-31056 (2020) - [j27]Xiangming Wen, Jenhui Chen, Zhiqun Hu, Zhaoming Lu:
A p-Opportunistic Channel Access Scheme for Interference Mitigation Between V2V and V2I Communications. IEEE Internet Things J. 7(5): 3706-3718 (2020) - [j26]Lei Wang, Jenhui Chen, Yang Peng, Lei Zhang:
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017). Mob. Networks Appl. 25(1): 1-3 (2020)
2010 – 2019
- 2019
- [j25]Jenhui Chen, Ashu Abdul:
A Session-Based Customer Preference Learning Method by Using the Gated Recurrent Units With Attention Function. IEEE Access 7: 17750-17759 (2019) - 2017
- [c27]Ting-Chun Lien, Jenhui Chen:
A Study of an Ideal One-Hop Broadcast Range for Vehicle Communication Network on LTE-V. ISPAN-FCST-ISCC 2017: 380-384 - 2015
- [j24]Peng Dai, Jenhui Chen, Yiqiang Zhao, Yen-Han Lai:
A study of a wire-wireless hybrid NoC architecture with an energy-proportional multicast scheme for energy efficiency. Comput. Electr. Eng. 45: 402-416 (2015) - [j23]Ray-Guang Cheng, Firas M. Al-Taee, Jenhui Chen, Chia-Hung Wei:
A Dynamic Resource Allocation Scheme for Group Paging in LTE-Advanced Networks. IEEE Internet Things J. 2(5): 427-434 (2015) - [j22]Ray-Guang Cheng, Jenhui Chen, Dan-Wu Chen, Chia-Hung Wei:
Modeling and Analysis of an Extended Access Barring Algorithm for Machine-Type Communications in LTE-A Networks. IEEE Trans. Wirel. Commun. 14(6): 2956-2968 (2015) - [c26]Jenhui Chen, Peng Dai:
Multicast Transmission with Energy-Proportional Power-Gating Scheme for Wireless Interconnects NoC. GLOBECOM Workshops 2015: 1-6 - [c25]Jenhui Chen, Yun-Ting Lin, Ray-Guang Cheng:
A delayed random access speed-up scheme for group paging in machine-type communications. ICC 2015: 623-627 - 2014
- [j21]Jenhui Chen, Zhuxiu Yuan, Lei Wang:
An apropos signal report and adaptive period (ASAP) scheme for fast handover in the fourth-generation wireless networks. J. Netw. Comput. Appl. 45: 15-26 (2014) - [j20]Jenhui Chen, Ting-Chun Lien, Han-Ming Yang:
The implementation of IEEE 802.16m protocol module for ns-3 simulator. Simul. Model. Pract. Theory 49: 41-56 (2014) - [j19]Jenhui Chen, Chih-Cheng Yang, Shiann-Tsong Sheu:
Downlink Femtocell Interference Mitigation and Achievable Data Rate Maximization: Using FBS Association and Transmit Power-Control Schemes. IEEE Trans. Veh. Technol. 63(6): 2807-2818 (2014) - 2012
- [j18]Jenhui Chen, Woei-Hwa Tarn, Wu-Hsiao Hsu, Chih-Chieh Wang:
Cross-layer end-to-end label switching protocol for WiMAX-MPLS heterogeneous networks. J. Syst. Softw. 85(11): 2459-2469 (2012) - [c24]Shiann-Tsong Sheu, LuWei Chen, Jenhui Chen:
Advanced Power Saving Mechanism in IEEE 802.16M Wireless Metropolitan Area Networks. VTC Spring 2012: 1-5 - 2011
- [j17]Wu-Hsiao Hsu, Jenhui Chen, Sheng-Cheng Yeh:
A novel Delay-Based Multicast Routing Protocol in ad hoc wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 7(4): 211-220 (2011) - [c23]Jenhui Chen, Chin-Yang Sheng, Yu-Fang Hsiao:
Femtocell BS power control by using game theory approach for two-tier WiMAX networks. IWCMC 2011: 2082-2086 - 2010
- [j16]Wu-Hsiao Hsu, Yuh-Pyng Shieh, Jenhui Chen:
Multiple path selection algorithm for DiffServ-aware MPLS traffic engineering. Comput. Commun. 33(13): 1557-1565 (2010) - [j15]Jenhui Chen:
AMNP: ad hoc multichannel negotiation protocol with broadcast solutions for multi-hop mobile wireless networks. IET Commun. 4(5): 521-531 (2010) - [j14]Jenhui Chen, Chih-Chieh Wang:
Secure and reliable transmission mechanism for orthogonal frequency-division multiple access worldwide interoperability for microwave access systems. IET Commun. 4(9): 1095-1107 (2010) - [j13]Chih-Peng Lin, Jenhui Chen, Hsing-Lung Chen:
An efficient bandwidth allocation algorithm for real-time VBR stream transmission under IEEE 802.16 wireless networks. J. Netw. Comput. Appl. 33(4): 467-476 (2010)
2000 – 2009
- 2009
- [j12]Jenhui Chen, Chih-Chieh Wang:
Cross-layer cut-through switching mechanism for IEEE 802.16d/e wireless networks. IEEE Commun. Lett. 13(10): 779-781 (2009) - [j11]Hsueh-Wen Tseng, Ai-Chun Pang, Jenhui Chen, Chin-Fu Kuo:
An Adaptive Contention Control Strategy for IEEE 802.15.4-Based Wireless Sensor Networks. IEEE Trans. Veh. Technol. 58(9): 5164-5173 (2009) - [c22]Jenhui Chen, Jia-You Wu:
A Downlink Delay-Minimized Scheduling Scheme for OFDMA WiMAX Systems. Mobile Data Management 2009: 459-464 - 2008
- [c21]Jenhui Chen, Syao-Syuan Liu, Chih-Chieh Wang:
Fault-tolerant transmission mechanism for IEEE 802.16e OFDMA systems. QSHINE 2008: 40 - 2007
- [j10]Jenhui Chen, Wei-Kuang Tan:
Predictive Dynamic Channel Allocation Scheme for Improving Power Saving and Mobility in BWA Networks. Mob. Networks Appl. 12(1): 15-30 (2007) - [c20]Jenhui Chen, Jui-Hsiang Sun:
Low buffering and waiting-time video-on-demand broadcasting scheme for WiMAX systems. MobiMedia 2007: 40 - [c19]Jenhui Chen, Chiang-Wei Chang:
A Signal-Aware Uplink Resource Allocation Strategy in IEEE 802.16 Systems. WiMob 2007: 15 - 2006
- [j9]Jenhui Chen, Shiann-Tsong Sheu:
A Reliable Broadcast/Multicast Scheme for Multihop Mobile Ad Hoc Networks. IEICE Trans. Commun. 89-B(3): 867-878 (2006) - [j8]Jenhui Chen, Chih-Chieh Wang, Jiann-Der Lee:
Geographic Channel Assignment Framework for Broadband Wireless Access Networks. IEICE Trans. Commun. 89-B(11): 3160-3163 (2006) - [j7]Jenhui Chen, Chien-Chun Joe Chou:
Autonomous Clustering and Message Passing Protocol for Energy Efficiency in Wireless Sensor Networks. Int. J. Pervasive Comput. Commun. 2(4): 332-341 (2006) - [c18]Jenhui Chen, Shuhua Jiang:
Analysis and Implementation of Time-Slot Allocation in TDMA System with Limited Queue Constraint in WLANs. VTC Fall 2006: 1-5 - [c17]Jenhui Chen, Shuhua Jiang:
Improvement of Slots Utilization with a Stealing-TDMA Protocol for Ad Hoc Network. VTC Fall 2006: 1-5 - [c16]Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang:
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks. VTC Spring 2006: 628-632 - 2005
- [j6]Jenhui Chen, Shiann-Tsong Sheu:
Distributed multichannel MAC protocol for IEEE 802.11 ad hoc wireless LANs. Comput. Commun. 28(9): 1000-1013 (2005) - [j5]Jenhui Chen, Muwen Huang:
A Broadcast Engagement ACK Mechanism for Reliable Broadcast Transmission in Mobile Ad Hoc Networks. IEICE Trans. Commun. 88-B(9): 3570-3578 (2005) - [j4]Jenhui Chen, Ai-Chun Pang, Shiann-Tsong Sheu, Hsueh-Wen Tseng:
High Performance Wireless Switch Protocol for IEEE 802.11 Wireless Networks. Mob. Networks Appl. 10(5): 741-751 (2005) - [c15]Jenhui Chen, Li-Ren Li:
Path planning protocol for collaborative multi-robot systems. CIRA 2005: 721-726 - [c14]Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee:
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks. ICITA (2) 2005: 305-310 - [c13]Jenhui Chen, Chung-Ching Chiou, Shih-Lin Wu:
A Fast Path Recovery Mechanism for MPLS Networks. ICN (2) 2005: 58-65 - [c12]Chih-Feng Chao, Ying-Hong Wang, Jenhui Chen, Yi-Chien Lin:
A cache sharing interface for data access in mobile ad hoc networks. ITRE 2005: 78-82 - [c11]Jenhui Chen, Wei-Kuang Tan, Chih-Chieh Wang:
MCAS: a macrocell channel allocation scheme for broadband wireless access networks. WiMob (1) 2005: 107-114 - 2004
- [c10]Jenhui Chen, Yen-Da Chen:
AMNP: ad hoc multichannel negotiation protocol for multihop mobile wireless networks. ICC 2004: 3607-3612 - 2003
- [j3]Shiann-Tsong Sheu, Yung-Da Wang, Hua-Chiang Yin, Jenhui Chen:
Adaptive rate controller for mobile ad hoc networks. Int. J. Mob. Commun. 1(3): 312-328 (2003) - [j2]Shiann-Tsong Sheu, Yihjia Tsai, Jenhui Chen:
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802.11 Ad Hoc Wireless Networks. Wirel. Networks 9(2): 165-177 (2003) - [j1]Shiann-Tsong Sheu, Yihjia Tsai, Jenhui Chen:
Erratum: MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802.11 Ad Hoc Wireless Networks. Wirel. Networks 9(3): 271 (2003) - [c9]Shiann-Tsong Sheu, Jenhui Chen, Hsueh-Wen Tseng, Hsien-Ta Chiang:
A Safe Multiple Access-Rates Transmission (SMART) Scheme for IEEE 802.11 Wireless Networks. AINA 2003: 172-175 - [c8]Shiann-Tsong Sheu, Jenhui Chen, Hsueh-Wen Tseng:
Wireless switch protocol. ICC 2003: 127-131 - [c7]Jenhui Chen, Shiann-Tsong Sheu, Chin-An Yang:
A new multichannel access protocol for IEEE 802.11 ad hoc wireless LANs. PIMRC 2003: 2291-2296 - [c6]Shiann-Tsong Sheu, Jenhui Chen, Tobias Chen:
Data flushing data transfer protocol for IEEE 802.11 ad hoc wireless network. WCNC 2003: 1533-1537 - 2002
- [c5]Shiann-Tsong Sheu, Yihjia Tsai, Jenhui Chen:
A highly reliable broadcast scheme for IEEE 802.11 multi-hop ad hoc networks. ICC 2002: 610-615 - [c4]Shiann-Tsong Sheu, Jenhui Chen:
Performance Analysis of Multicast MAC Protocol for Multichannel Dual Bus Networks. ICOIN (1) 2002: 419-430 - [c3]Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Ye:
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol. ICPADS 2002: 267-272 - [c2]Shiann-Tsong Sheu, Jenhui Chen:
MR2RP: the multi-rate and multi-range routing protocol for ad hoc wireless networks. ISCC 2002: 435-440 - 2001
- [c1]Shiann-Tsong Sheu, Jenhui Chen:
A novel delay-oriented shortest path routing protocol for mobile ad hoc networks. ICC 2001: 1930-1934
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint