default search action
Menglong Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Menglong Wu, Yongfa Xie, Yongchao Shi, Jianwen Zhang, Tianao Yao, Wenkai Liu:
An Adaptively Biased OFDM Based on Hartley Transform for Visible Light Communication Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(6): 928-931 (2024) - [j14]Menglong Wu, Jianwen Zhang, Yongfa Xie, Yongchao Shi, Tianao Yao:
Peak-to-Average Power Ratio Reduction Scheme in DCO-OFDM with a Combined Index Modulation and Convex Optimization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1425-1429 (2024) - [j13]Wenkai Liu, Lin Zhang, Menglong Wu, Xichang Cai, Hongxia Dong:
Research on Lightweight Acoustic Scene Perception Method Based on Drunkard Methodology. IEICE Trans. Inf. Syst. 107(1): 83-92 (2024) - [j12]Lihua Ke, Menglong Wu, Yicheng Ye, Nanyan Hu, Yaoyao Meng:
Stability risk early warning for mine goaf: Based on D-RES and asymmetric fuzzy connection cloud model. J. Comput. Sci. 78: 102279 (2024) - 2023
- [j11]Xichang Cai, Yanggang Gan, Menglong Wu, Juan Wu:
Weak Supervised Sound Event Detection Based on Puzzle CAM. IEEE Access 11: 89290-89297 (2023) - [j10]Wenkai Liu, Cuizhu Qin, Menglong Wu, Wenle Bai, Hongxia Dong:
Selective Learning of Human Pose Estimation Based on Multi-Scale Convergence Network. IEICE Trans. Inf. Syst. 106(5): 1081-1084 (2023) - [j9]Yufei Li, Nanyan Hu, Yicheng Ye, Menglong Wu:
Improved catastrophe progression method of underground goaf risk evaluation. J. Intell. Fuzzy Syst. 44(3): 4521-4536 (2023) - [j8]Nanyan Hu, Xuexue Li, Yufei Li, Yicheng Ye, Menglong Wu:
Decision-making and optimization model for fire emergency replacements in colleges based on BWM and VIKOR under interval 2-tuple linguistic. J. Intell. Fuzzy Syst. 45(2): 3123-3136 (2023) - [c8]Xichang Cai, Juan Wu, Menglong Wu, Yanggang Gan:
Sound Event Classification Based on Fusion of Multiple Pre-trained Models. ICCEIC 2023: 236-239 - 2022
- [j7]Menglong Wu, Cuizhu Qin, Hongxia Dong, Wenkai Liu, Xiaodong Nie, Xichang Cai, Yundong Li:
Detection and Tracking Method for Dynamic Barcodes Based on a Siamese Network. IEICE Trans. Commun. 105-B(7): 866-875 (2022) - [j6]Menglong Wu, Yan Li, Wenkai Liu:
A Hierarchical Bilateral-Diffusion Architecture for Color Image Encryption. J. Inf. Process. Syst. 18(1): 59-74 (2022) - [c7]Wenkai Liu, Wenhan Chen, Menglong Wu:
Performance of interleaved CA-Polar concatenated codes in VLC System. EITCE 2022: 991-995 - [c6]Menglong Wu, Hongxia Dong, Xichang Cai, Ziling Qiao, Cuizhu Qin, Lin Zhang:
Multi-Feature Convergence Network for Acoustic Scene Classification. EITCE 2022: 1142-1145 - 2021
- [j5]Wenle Bai, Ziyang Ma, Yulong Han, Menglong Wu, Zhongyuan Zhao, Mengkun Li, Chengcai Wang:
Joint Optimization of Computation Offloading, Data Compression, Energy Harvesting, and Application Scenarios in Fog Computing. IEEE Access 9: 45462-45473 (2021) - [j4]Menglong Wu, Dexuan Du, Yundong Li, Wenle Bai, Wenkai Liu:
Multi-Cascade Perceptual Human Posture Recognition Enhancement Network. IEEE Access 9: 64256-64266 (2021) - [j3]Jianhong Zhang, Menglong Wu:
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. Secur. Commun. Networks 2021: 3963037:1-3963037:13 (2021) - [c5]Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng:
A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. INFOCOM Workshops 2021: 1-6 - 2020
- [j2]Menglong Wu, Yicheng Ye, Nanyan Hu, Qihu Wang, Huimin Jiang, Wen Li:
EMD-GM-ARMA Model for Mining Safety Production Situation Prediction. Complex. 2020: 1341047:1-1341047:14 (2020) - [c4]Wenkai Liu, Xingkun Jin, Xiaodong Nie, Menglong Wu:
Performance of Concatenated Polar Codes in VLC System. EITCE 2020: 163-167 - [c3]Menglong Wu, Xiaodong Nie, Biqi Wang, Wenkai Liu:
Design of High Capacity 8 colors Code based on Screen-Camera Communication. EITCE 2020: 345-349 - [c2]Menglong Wu, Yan Li, Wenkai Liu, Ming Huang:
A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password. EITCE 2020: 438-443
2010 – 2019
- 2018
- [j1]Jin Liu, Haoliang Ren, Menglong Wu, Jin Wang, Hye-Jin Kim:
Multiple relations extraction among multiple entities in unstructured text. Soft Comput. 22(13): 4295-4305 (2018) - 2017
- [c1]Wenxiu Hu, Min Zhang, Dahai Han, Qingbo Chen, Menglong Wu, Lin Ai:
Polar Channel Coding for the Ultraviolet Communication System Combating Path-Loss Propagation and NLOS Effects. CSPS 2017: 863-871
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint