default search action
Kehe Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j12]Kehe Wu, Jiawei Li, Bo Zhang:
Abnormal Detection of Wireless Power Terminals in Untrusted Environment Based on Double Hidden Markov Model. IEEE Access 9: 18682-18691 (2021) - [j11]Wenchao Cui, Qiong Lu, Asif Moin Qureshi, Wei Li, Kehe Wu:
An adaptive LeNet-5 model for anomaly detection. Inf. Secur. J. A Glob. Perspect. 30(1): 19-29 (2021) - 2020
- [j10]Kehe Wu, Jiawei Li, Bo Zhang, Zongchao Yu, Xuan Liu:
Preventive Dispatch Strategy Against FDIA Induced Overloads in Power Systems With High Wind Penetration. IEEE Access 8: 210452-210461 (2020) - [i2]Kehe Wu, Zuge Chen, Xiaoliang Zhang, Wei Li:
Improvement of Classification in One-Stage Detector. CoRR abs/2011.10465 (2020) - [i1]Kehe Wu, Zuge Chen, Qi Ma, Xiaoliang Zhang, Wei Li:
Decoupled Self Attention for Accurate One Stage Object Detection. CoRR abs/2012.07630 (2020)
2010 – 2019
- 2019
- [j9]Zuge Chen, Kehe Wu, Yuanbo Li, Minjian Wang, Wei Li:
SSD-MSN: An Improved Multi-Scale Object Detection Network Based on SSD. IEEE Access 7: 80622-80632 (2019) - [j8]Jianyong Xue, Kehe Wu, Yan Zhou:
A risk analysis and prediction model of electric power GIS based on deep learning. Int. J. Comput. Sci. Eng. 18(1): 39-43 (2019) - 2018
- [j7]Kehe Wu, Zuge Chen, Wei Li:
A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks. IEEE Access 6: 50850-50859 (2018) - [j6]Wei Li, Rui Li, Kehe Wu, Rui Cheng, Linping Su, Wenchao Cui:
Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications. IEEE Access 6: 71194-71207 (2018) - 2017
- [j5]Kehe Wu, Yayun Zhu, Quan Li, Ziwei Wu:
A distributed real-time data prediction framework for large-scale time-series data using stream processing. Int. J. Intell. Comput. Cybern. 10(2): 145-165 (2017) - 2015
- [j4]Kehe Wu, Long Chen, Yi Li:
A Trusted-based Cloud Computing Virtual Storage System and Key Technologies. Int. J. Comput. Commun. Control 10(4): 579-592 (2015) - 2014
- [j3]Long Chen, Kehe Wu, Yi Li:
A Load Balancing Algorithm Based on Maximum Entropy Methods in Homogeneous Clusters. Entropy 16(11): 5677-5697 (2014) - 2013
- [j2]Zhuxiao Wang, Jing Guo, Fei Chen, Kehe Wu, Peng Wang:
An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings. J. Softw. 8(1): 243-250 (2013) - 2012
- [c14]Zhuxiao Wang, Zhitao Guan, Wei Li, Kehe Wu, Jing Guo, Guanhua Tian:
A Tableau-Based Reasoning Algorithm for Distributed Dynamic Description Logics. ICICA (1) 2012: 192-199 - [c13]Zhuxiao Wang, Hui Peng, Jing Guo, Ying Zhang, Kehe Wu, Huan Xu, Xiaofeng Wang:
An Architecture Description Language Based on Dynamic Description Logics. Intelligent Information Processing 2012: 157-166 - 2011
- [c12]Xiaohui Wang, Kehe Wu, Yuhan Xu:
The data model and structure of power GIS. GrC 2011: 734-738 - [c11]Kehe Wu, Xiao Tu, Cheng Duan:
Research and Implementation of Entropy-Based Model to Evaluation of the Investment Efficiency of Grid Enterprise. WISM (2) 2011: 44-50 - 2010
- [c10]Kehe Wu, Tong Zhang, Fei Chen:
Research on Active Controllable Defense Model Based on Zero-PDR Model. IITSI 2010: 572-575 - [c9]Wei Li, Zhiwei Feng, Jing Zhou, Kehe Wu, Jing Teng:
Dynamic Increasing the Capacity of Transmission Line Based on the Kylin Operating System. SUComS 2010: 10-16 - [c8]Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan:
Research on a Behavior-based active controllable defense model and its application. WCNIS 2010: 687-691
2000 – 2009
- 2009
- [j1]Kehe Wu, Xia He, Tingshun Li, Hongyu Tao:
To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene. Comput. Inf. Sci. 2(1): 137-141 (2009) - [c7]Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma:
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. IAS 2009: 770-773 - [c6]Kehe Wu, Tong Zhang, Gang Ma:
The Design and Implementation of Mandatory Running Control. Software Engineering Research and Practice 2009: 279-282 - 2007
- [c5]Yinglong Ma, Beihong Jin, Yuancheng Li, Kehe Wu:
A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments. PAKDD 2007: 183-192 - [c4]Yuancheng Li, Kehe Wu, Yinglong Ma, Shipeng Zhang:
Image Digital Watermarking Technique Based on Kernel Independent Component Analysis. RSFDGrC 2007: 467-474 - 2006
- [c3]Yinglong Ma, Kehe Wu, Yi Zheng, Wei Li:
Multi-agent Coordination Based on Semantic Approximation. IAT Workshops 2006: 510-513 - [c2]Yinglong Ma, Kehe Wu, Beihong Jin, Wei Li:
A Combination Framework for Semantic Based Query Across Multiple Ontologies. PRIMA 2006: 463-470 - [c1]Yinglong Ma, Kehe Wu, Beihong Jin, Shaohua Liu:
Approximate Semantic Query Based on Multi-agent Systems. RSKT 2006: 735-741
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint