


default search action
Wenbo He
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Wenbo He 0001
— McMaster University, ON, Canada - Wenbo He 0002
— Washington University, St. Louis, MO, USA - Wenbo He 0003
— McMaster University, Hamilton, ON, Canada - Wenbo He 0004
— West China Hospital of Sichuan University, Chengdu, Sichuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Xudong Sun, Yu Wang, Zhanglin Liu, Shaoxuan Gao, Wenbo He, Chao Tong
:
SlimDL: Deploying ultra-light deep learning model on sweeping robots. Eng. Appl. Artif. Intell. 149: 110415 (2025)
[j10]Wei He
, Wenbo He, Jinyu Lei
, Sitong Wan
, Zhiyuan Wang:
Multi-source perception data fusion of vessels in visual occlusion scenarios: Leveraging prior knowledge of vessel motion. Eng. Appl. Artif. Intell. 156: 111118 (2025)
[j9]Chenghao Li
, Gang Liang
, Jiaping Lin
, Liangyin Chen, Wenbo He, Jin Yang:
MEN-VVDF: Multipath excitation network-based video violence detection framework focusing on human activity in keyframes. J. Vis. Commun. Image Represent. 112: 104573 (2025)
[i11]Wenbo He, Zhijian Ou:
Joint-stochastic-approximation Autoencoders with Application to Semi-supervised Learning. CoRR abs/2505.18558 (2025)
[i10]Chengqi Li, Zhihao Shi, Yangdi Lu, Wenbo He, Xiangyu Xu:
Robust Neural Rendering in the Wild with Asymmetric Dual 3D Gaussian Splatting. CoRR abs/2506.03538 (2025)- 2024
[j8]Feng Shuang
, Wenbo He, Shaodong Li
:
3D hand reconstruction via aggregating intra and inter graphs guided by prior knowledge for hand-object interaction scenario. J. Vis. Commun. Image Represent. 100: 104129 (2024)
[c36]Chengqi Li
, Sarah Simionescu, Wenbo He, Sanzheng Qiao, Nadjia Kara, Chamseddine Talhi:
Utility-Preserving Face Anonymization via Differentially Private Feature Operations. INFOCOM 2024: 2279-2288
[c35]Yunshen Huang, Wenbo He, Yiannis Kantaros, Shen Zeng:
Spatiotemporal Co-Design Enabling Prioritized Multi-Agent Motion Planning. IROS 2024: 10281-10288
[i9]Feng Shuang, Wenbo He, Shaodong Li:
3D Hand Reconstruction via Aggregating Intra and Inter Graphs Guided by Prior Knowledge for Hand-Object Interaction Scenario. CoRR abs/2403.01733 (2024)
[i8]Yangdi Lu, Wenbo He:
Learning with Noisy Ground Truth: From 2D Classification to 3D Reconstruction. CoRR abs/2406.15982 (2024)
[i7]Yangdi Lu, Wenbo He:
Mitigating Noisy Supervision Using Synthetic Samples with Soft Labels. CoRR abs/2406.16966 (2024)- 2023
[j7]Zhaohuan Ding
, Longzhou Guan, Wenbo He, Heng Gu, Yong Wang, Xiaoli Li:
Spatial characteristics of closed-loop TMS-EEG with occipital alpha-phase synchronized. Biomed. Signal Process. Control. 83: 104650 (2023)
[j6]Mingqi Chen
, Shaodong Li, Feng Shuang
, Xi Liu, Kai Luo, Wenbo He:
Lightweight 3D hand pose estimation by cascading CNNs with reinforcement learning. Pattern Recognit. Lett. 174: 137-144 (2023)
[c34]Yangdi Lu, Zhiwei Xu, Wenbo He:
Rethinking Label Refurbishment: Model Robustness under Label Noise. AAAI 2023: 15000-15008
[c33]Yunshen Huang, Wenbo He, Shen Zeng:
A Differential Dynamic Programming-based Approach for Balancing Energy and Time Optimality in Motion Planning. Allerton 2023: 1-7
[c32]Wenbo He, Yunshen Huang, Jinran Qie, Shen Zeng:
Value Iteration Algorithm for Solving Shortest Path Problems with Homology Class Constraints. CDC 2023: 8400-8405
[c31]Mahdee Jodayree
, Wenbo He, Ryszard Janicki:
Preventing Image Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. KES 2023: 2723-2732
[c30]Mahdee Jodayree
, Wenbo He, Ryszard Janicki:
Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. IJCRS 2023: 612-626
[c29]Zhiwei Xu, Yangdi Lu, Wenbo He:
Revisit Linear Transformation for Image Privacy in Machine Learning. TPS-ISA 2023: 156-162
[i6]Sajid Rahim, Kourosh Sabri, Anna Ells, Alan Wassyng, Mark Lawford, Linyang Chu, Wenbo He:
Novel Fundus Image Preprocessing for Retcam Images to Improve Deep Learning Classification of Retinopathy of Prematurity. CoRR abs/2302.02524 (2023)- 2022
[c28]Wenbo He, Yunshen Huang, Shen Zeng:
Motion Planning with Homotopy Class Constraints via the Auxiliary Energy Reduction Technique. ACC 2022: 4933-4938
[c27]Yangdi Lu, Wenbo He:
SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels. IJCAI 2022: 3278-3284
[c26]Yangdi Lu, Yang Bo, Wenbo He:
Noise Attention Learning: Enhancing Noise Robustness by Gradient Scaling. NeurIPS 2022
[c25]Yangdi Lu, Yang Bo, Wenbo He:
An Ensemble Model for Combating Label Noise. WSDM 2022: 608-617
[i5]Yangdi Lu, Wenbo He:
SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels. CoRR abs/2205.01156 (2022)- 2021
[c24]Yangdi Lu, Wenbo He:
MixNN: Combating Noisy Labels in Deep Learning by Mixing with Nearest Neighbors. IEEE BigData 2021: 847-856
[c23]Shusheng Li, Wenbo He:
VideoLoc: Video-based Indoor Localization with Text Information. INFOCOM 2021: 1-10
[i4]Yang Bo, Yangdi Lu, Wenbo He:
CLTA: Contents and Length-based Temporal Attention for Few-shot Action Recognition. CoRR abs/2103.10567 (2021)
[i3]Yangdi Lu, Yang Bo, Wenbo He:
Co-matching: Combating Noisy Labels by Augmentation Anchoring. CoRR abs/2103.12814 (2021)
[i2]Yangdi Lu, Yang Bo, Wenbo He:
Confidence Adaptive Regularization for Deep Learning with Noisy Labels. CoRR abs/2108.08212 (2021)- 2020
[c22]Jinyu Liu
, Lei Fan
, Renqing Li, Wenbo He, Nian Liu, Zhanhong Liu:
An Accurate Frequency Estimation Algorithm by Using DFT and Cosine Windows. ChinaCom 2020: 688-697
[c21]Yang Bo, Yangdi Lu, Wenbo He:
Few-Shot Learning of Video Action Recognition Only Based on Video Contents. WACV 2020: 584-593
2010 – 2019
- 2019
[c20]Shusheng Li, Wenbo He:
VidAnomaly: LSTM-Autoencoder-Based Adversarial Learning for One-Class Video Classification With Multiple Dynamic Images. IEEE BigData 2019: 2881-2890- 2018
[j5]Jike Ge, Wenbo He, Zuqin Chen, Can Liu, Jun Peng, Guorong Chen:
A Fine-Grained Stateful Data Analytics Method Based on Resilient State Table. Int. J. Softw. Sci. Comput. Intell. 10(2): 66-79 (2018)
[j4]Wenbo He, Bobak Nazer
, Shlomo Shamai Shitz
:
Uplink-Downlink Duality for Integer-Forcing. IEEE Trans. Inf. Theory 64(3): 1992-2011 (2018)
[c19]Yangdi Lu, Yang Bo, Wenbo He, Amir Nabatchian:
Dynamic Partition Forest: An Efficient and Distributed Indexing Scheme for Similarity Search based on Hashing. IEEE BigData 2018: 1059-1064
[c18]Yangdi Lu, Wenbo He, Amir Nabatchian:
Random Draw Forest: A Salient Index for Similarity Search Over Multimedia Data. BigMM 2018: 1-5
[c17]Lijing Wang, Yongqiang Lyu, Jian Liu, Wentao Shang, Wenbo He, Dongsheng Wang, Geyong Min:
Naxos: A Named Data Networking Consensus Protocol. HPCC/SmartCity/DSS 2018: 986-991- 2017
[c16]Jike Ge, Zuqin Chen, Can Liu, Jun Peng
, Wenbo He, Nan Zhu:
A RST-based stateful data analytics within spark. IEEE ICCI*CC 2017: 394-399
[c15]Farshad Rahimi Asl, Fei Chiang, Wenbo He, Reza Samavi
:
Privacy aware web services in the cloud. CNS 2017: 458-466- 2016
[c14]Lijing Wang, Wentao Shang, Wenbo He, Dongsheng Wang:
Consistent replication protocol for Named Data Networking. ICNP 2016: 1-2
[c13]Wenbo He, Bobak Nazer:
Integer-forcing source coding: Successive cancellation and source-channel duality. ISIT 2016: 155-159
[c12]Landu Jiang, Xi Chen, Wenbo He:
SafeCam: Analyzing intersection-related driver behaviors using multi-sensor smartphones. PerCom 2016: 1-9
[i1]Wenbo He, Bobak Nazer, Shlomo Shamai:
Uplink-Downlink Duality for Integer-Forcing. CoRR abs/1608.03351 (2016)- 2015
[c11]Wenbo He, Bobak Nazer, Shlomo Shamai
:
Dirty-paper integer-forcing. Allerton 2015: 1053-1060
[c10]Feng Chen, Noman Mohammed, Shuang Wang, Wenbo He, Samuel Cheng, Xiaoqian Jiang:
Cloud-assisted distributed private data sharing. BCB 2015: 202-211
[c9]Qinglong Wang, Amir Yahyavi, Bettina Kemme, Wenbo He:
I know what you did on your smartphone: Inferring app usage over encrypted data traffic. CNS 2015: 433-441
[c8]Nan Zhu, Wenbo He:
ScalaSEM: Scalable validation of SDN design with deployable code. IPCCC 2015: 1-8
[c7]Islam El Bakoury, Wenbo He, Bobak Nazer:
Integer-forcing interference alignment: Iterative optimization via aligned lattice reduction. ISIT 2015: 581-585
[c6]Wenbo He, Chen Feng, Corina I. Ionita, Bobak Nazer:
Collision scheduling for cellular networks. ISIT 2015: 1417-1421
[c5]Wenbo He, Chen Feng, Bobak Nazer:
Collision Scheduling for Cellular Networks with Spatial Connectivity Constraints. VTC Fall 2015: 1-2- 2014
[j3]Pinghui Wang, Wenbo He, Junzhou Zhao:
A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare. IEEE Internet Comput. 18(2): 10-15 (2014)
[c4]Wenbo He, Bobak Nazer, Shlomo Shamai
:
Uplink-downlink duality for integer-forcing. ISIT 2014: 2544-2548
[c3]Wenbo He, Bobak Nazer, Shlomo Shamai
:
Uplink-downlink duality for integer-forcing: Effective SINRs and iterative optimization. SPAWC 2014: 474-478- 2011
[j2]Zhong Xu, Ruiping Ma, Shuai Liu, Wenbo He:
EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts. Ad Hoc Sens. Wirel. Networks 11(1-2): 93-110 (2011)
[c2]Yongping Xiong, Wenbo He, Canfeng Chen, Jian Ma, Limin Sun:
Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks. MASS 2011: 691-696- 2010
[c1]Yongping Xiong, Limin Sun, Wenbo He, Jian Ma:
Anycast routing in mobile opportunistic networks. ISCC 2010: 599-604
2000 – 2009
- 2008
[b1]Wenbo He:
Achieving Privacy and Integrity of Data Aggregation in Wireless Sensor Networks. University of Illinois Urbana-Champaign, USA, 2008- 2002
[j1]Muriel Médard, Richard A. Barry, Steven G. Finn, Wenbo He, Steven Lumetta:
Generalized loop-back recovery in optical mesh networks. IEEE/ACM Trans. Netw. 10(1): 153-164 (2002)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-04 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







