default search action
Renjian Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Ning Yu, Xiaofeng Ma, Xuanhe Chen, Renjian Feng, Yinfeng Wu:
High-Precision Indoor Positioning Method Based on Multifeature Fusion of Inertial Sensor Network. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - 2023
- [j22]Renjian Feng, Jiaxuan Yan, Yinfeng Wu, Ning Yu, Xudong Yin:
Methods for Comprehensive Calibration of a Low-Frequency Angular Acceleration Rotary Table. Sensors 23(10): 4876 (2023) - 2021
- [j21]Yinfeng Wu, Jingya Zhao, Ning Yu, Renjian Feng:
Indoor surveillance video based feature recognition for pedestrian dead reckoning. Expert Syst. Appl. 173: 114653 (2021) - [j20]Jiaxuan Yan, Renjian Feng, Yinfeng Wu, Ning Yu:
A Calibration Scheme With Combination of the Optical Shaft Encoder and Laser Triangulation Sensor for Low-Frequency Angular Acceleration Rotary Table. IEEE Trans. Instrum. Meas. 70: 1-13 (2021) - 2020
- [j19]Renjian Feng, Weijie Jiang, Ning Yu, Yinfeng Wu, Jiaxuan Yan:
Projected Minimal Gated Recurrent Unit for Speech Recognition. IEEE Access 8: 215192-215201 (2020)
2010 – 2019
- 2019
- [j18]Ning Yu, Shengnan Zhao, Xiaofeng Ma, Yinfeng Wu, Renjian Feng:
Effective Fingerprint Extraction and Positioning Method Based on Crowdsourcing. IEEE Access 7: 162639-162651 (2019) - [c4]Wenjian Wang, Fangzhou Hu, Yi Zhang, Renjian Feng, Yinfeng Wu, Zhanjun Wang:
Gait Phase Discrimination Based on a Foot-Mounted Gyroscope. CISP-BMEI 2019: 1-6 - 2018
- [j17]Ning Yu, Xiaohong Zhan, Shengnan Zhao, Yinfeng Wu, Renjian Feng:
A Precise Dead Reckoning Algorithm Based on Bluetooth and Multiple Sensors. IEEE Internet Things J. 5(1): 336-351 (2018) - [j16]Yinfeng Wu, Yachao Hu, Yiwen Su, Ning Yu, Renjian Feng:
Topology control for minimizing interference with delay constraints in an ad hoc network. J. Parallel Distributed Comput. 113: 63-76 (2018) - 2017
- [c3]Shaoshuai Zhang, Renjian Feng, Yinfeng Wu, Ning Yu:
Adaptive compressed sensing for acceleration data transmission in human motion capture. CISP-BMEI 2017: 1-6 - 2016
- [j15]Renjian Feng, Tongling Li, Yinfeng Wu, Ning Yu:
Reliable routing in wireless sensor networks based on coalitional game theory. IET Commun. 10(9): 1027-1034 (2016) - [j14]Ning Yu, Chenxian Xiao, Yinfeng Wu, Renjian Feng:
A Radio-Map Automatic Construction Algorithm Based on Crowdsourcing. Sensors 16(4): 504 (2016) - 2015
- [j13]Renjian Feng, Xiaona Han, Qiang Liu, Ning Yu:
A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 678926:1-678926:9 (2015) - [j12]Shenyun Che, Renjian Feng, Xuan Liang, Xiao Wang:
A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Secur. Commun. Networks 8(2): 168-175 (2015) - 2014
- [j11]Yongji Ren, Jianlin Zhong, Jun Huang, Yanbo Song, Xuguang Xin, Ning Yu, Renjian Feng:
Orthogonal Regression Based Multihop Localization Algorithm for Large-Scale Underwater Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j10]Renjian Feng, Shenyun Che, Xiao Wang, Jiangwen Wan:
An incentive mechanism based on game theory for trust management. Secur. Commun. Networks 7(12): 2318-2325 (2014) - 2013
- [j9]Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu:
A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j8]Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu:
Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Xiao Wang, Yinfeng Wu, Yongji Ren, Renjian Feng, Ning Yu, Jiangwen Wan:
An Evolutionary Game-Based Trust Cooperative Stimulation Model for Large Scale MANETs. Int. J. Distributed Sens. Networks 9 (2013) - [c2]Kefu Yi, Renjian Feng, Ning Yu, Peng Chen:
PARED: A testbed with parallel reprogramming and multi-channel debugging for WSNs. WCNC 2013: 4630-4635 - 2012
- [j6]Renjian Feng, Xiaolei Guo, Ning Yu, Jiangwen Wan:
Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons. Int. J. Distributed Sens. Networks 8 (2012) - [j5]Jiangwen Wan, Yang Yu, Yinfeng Wu, Renjian Feng, Ning Yu:
Hierarchical Leak Detection and Localization Method in Natural Gas Pipeline Monitoring Sensor Networks. Sensors 12(1): 189-214 (2012) - [c1]Xiao Wang, Renjian Feng, Yinfeng Wu, Shenyun Che, Yongji Ren:
A game theoretic malicious nodes detection model in MANETs. MASS Workshops 2012: 1-6 - 2011
- [j4]Renjian Feng, Xiaofeng Xu, Xiang Zhou, Jiangwen Wan:
A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory. Sensors 11(2): 1345-1360 (2011) - [j3]Jiangwen Wan, Xiaolei Guo, Ning Yu, Yinfeng Wu, Renjian Feng:
Multi-Hop Localization Algorithm Based on Grid-Scanning for Wireless Sensor Networks. Sensors 11(4): 3908-3938 (2011)
2000 – 2009
- 2009
- [j2]Jiangwen Wan, Ning Yu, Renjian Feng, Yinfeng Wu, Changming Su:
Localization refinement for wireless sensor networks. Comput. Commun. 32(13-14): 1515-1524 (2009) - [j1]Jiangwen Wan, Xiaofeng Xu, Renjian Feng, Yinfeng Wu:
Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks. Sensors 9(10): 8278-8310 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint