Jialong Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Adaptive Distributed Cooperative Tracking Control and Application for Multiagent Formation Under Communication Constraints.
IEEE Trans. Aerosp. Electron. Syst., August, 2024

Joint Discontinuity-Aware Depth Map Super-Resolution via Dual-Tasks Driven Unfolding Network.
IEEE Trans. Instrum. Meas., 2024

2023
Automatic method for quantitatively analyzing the body condition of livestock from 3D shape.
Comput. Electron. Agric., November, 2023

Resilient Event-Triggered Adaptive Cooperative Fault-Tolerant Tracking Control for Multiagent Systems Under Hybrid Actuator Faults and Communication Constraints.
IEEE Trans. Aerosp. Electron. Syst., June, 2023

Joint depth map super-resolution method via deep hybrid-cross guidance filter.
Pattern Recognit., April, 2023

IEMS: An IoT-Empowered Wearable Multimodal Monitoring System in Neurocritical Care.
IEEE Internet Things J., January, 2023

An Energy-Efficient Flexible Multi-Modal Wireless Sweat Sensing System Based on Laser Induced Graphene.
Sensors, 2023

Deep Arbitrary-Scale Unfolding Network for Color-Guided Depth Map Super-Resolution.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Explainable Unfolding Network For Joint Edge-Preserving Depth Map Super-Resolution.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Entity Attribute Alignment Method Based On Attribute Value Distribution.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

Flexible EEG Electrodes with Embedded Pressure Sensors and Customized Interface Towards Comfortable Home EEG Monitoring.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

2022
Modelling the Dynamics of Carbon Storages for Pinus densata Using Landsat Images in Shangri-La Considering Topographic Factors.
Remote. Sens., December, 2022

Finite-Time Adaptive Cooperative Fault-Tolerant Control for Multi-Agent System With Hybrid Actuator Faults.
IEEE Syst. J., 2022

Adaptive cooperative fault-tolerance tracking control for multi-agent system with hybrid actuator faults and multiple unknown control directions.
Expert Syst. Appl., 2022

A Hardware-based Lightweight ANN for Real-time Wearable Blood Pressure Estimation.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

A Flexible and Miniaturized Chest Patch for Real-time PPG/ECG/Bio-Z Monitoring.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

A 17.7µW CDS-CTIA for Wireless-powered Wearable Electrochemical Sweat Sensors.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

2021
Distributed Adaptive Consensus Tracking Control for Multi-Agent System With Communication Constraints.
IEEE Trans. Parallel Distributed Syst., 2021

Distributed Adaptive Finite-Time Compensation Control for UAV Swarm With Uncertain Disturbances.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

A Novel Control Approach for Flight-Stability of Fixed-Wing UAV Formation With Wind Field.
IEEE Syst. J., 2021

2020
Multi-UAV Formation Control Based on a Novel Back-Stepping Approach.
IEEE Trans. Veh. Technol., 2020

AI-powered Covert Botnet Command and Control on OSNs.
CoRR, 2020

Adaptive Virtual Capacitor Control for MTDC System With Deloaded Wind Power Plants.
IEEE Access, 2020

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
Design and flight-stability analysis of a closed fixed-wing unmanned aerial vehicle formation controller.
J. Syst. Control. Eng., 2019

Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Design and Information Architectures for an Unmanned Aerial Vehicle Cooperative Formation Tracking Controller.
IEEE Access, 2018

Collision Avoidance in Fixed-Wing UAV Formation Flight Based on a Consensus Control Algorithm.
IEEE Access, 2018

Fixed-Wing UAV Formation Control Design With Collision Avoidance Based on an Improved Artificial Potential Field.
IEEE Access, 2018

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

UAV Formation Flight Cooperative Tracking Controller Design.
Proceedings of the 15th International Conference on Control, 2018

Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Attacking the Brain: Races in the SDN Control Plane.
Proceedings of the 26th USENIX Security Symposium, 2017

Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Land cover's refined classification based on multi source of remote sensing information fusion: a case study of national geographic conditions census in China.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Systematic Mining of Associated Server Herds for Malware Campaign Discovery.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Using Landsat Thematic Mapper records to map land cover change and the impacts of reforestation programmes in the borderlands of southeast Yunnan, China: 1990-2010.
Int. J. Appl. Earth Obs. Geoinformation, 2014

Characterizing Google Hacking: A First Large-Scale Quantitative Study.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A Parallel Hybrid Evolutionary Particle Filter for Nonlinear State Estimation.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Indoor Water-Dispensing Robot with Two-Stage Localization.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011


  Loading...