Jiandong Wang

Orcid: 0009-0002-4914-7890

According to our database1, Jiandong Wang authored at least 149 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multivariate Process Monitoring for Safe Operation of Condensers in Thermal Power Plants Based on Normal Operating Zones.
IEEE Trans. Control. Syst. Technol., July, 2024

Identification for Nonlinear Flow Characteristics of Main Steam Regulating Valves in Power Plants by Mining Special Data Segments.
IEEE Trans. Ind. Informatics, May, 2024

Identification of Continuous-Time Dynamic Systems With Uncertainties Measured by Fuzzy Sets Subject to Model Structure Errors.
IEEE Trans. Fuzzy Syst., May, 2024

Multivariate Alarm Monitoring for Non-Convex Normal Operating Zones Based on Search Cones.
IEEE Trans Autom. Sci. Eng., January, 2024

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction.
Ad Hoc Networks, January, 2024

Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles.
Veh. Commun., 2024

Investigation on security management risk assessment of accounting resource sharing under internet of things big data technology.
Int. J. Manuf. Technol. Manag., 2024

Infiltration simulation and system design of biogas slurry drip irrigation using HYDRUS model.
Comput. Electron. Agric., 2024

Graph Transformer Hawkes Processes for Causal Structure Learning in Telecom Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Fake News Detection via Multi-scale Semantic Alignment and Cross-modal Attention.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

End-to-End Model-Based Deep Learning for Dual-Energy Computed Tomography Material Decomposition.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

2023
Cascaded Network Based on EfficientNet and Transformer for Deepfake Video Detection.
Neural Process. Lett., December, 2023

ATT-YOLOv5-Ghost: water surface object detection in complex scenes.
J. Real Time Image Process., October, 2023

Alarm Deadband Design Based on Maximum Amplitude Deviations and Bayesian Estimation.
IEEE Trans. Control. Syst. Technol., July, 2023

Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

Pattern Matching of Industrial Alarm Floods Using Word Embedding and Dynamic Time Warping.
IEEE CAA J. Autom. Sinica, April, 2023

A High-Precision Vehicle Detection and Tracking Method Based on the Attention Mechanism.
Sensors, January, 2023

Failure-Aware Service Request Protection in LEO Satellite Constellation Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Cell Electrical Measurement and Control Integrated Circuit System Design.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

Bit Bounce Detection for Drilling Process Based on Multi-Feature Graph and Graph Convolutional Network.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Energy consumption rectification to remove effects of different outdoor temperatures in degree-days.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023

Application of RPA-AI technology in enterprise financial intelligence.
Proceedings of the 19th International Conference on Natural Computation, 2023

Optimal alarm trippoints and timers for avoiding false alarms <sup>*</sup>.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
Dataset of alarm deadband design based on maximum amplitude deviation.
Dataset, November, 2022

Dataset of alarm deadband design based.
Dataset, November, 2022

Dataset of alarm deadband design based on maximum amplitude deviations.
Dataset, November, 2022

EcoForecast: An interpretable data-driven approach for short-term macroeconomic forecasting using N-BEATS neural network.
Eng. Appl. Artif. Intell., 2022

Analysis of time-varying cause-effect relations based on qualitative trends and change amplitudes.
Comput. Chem. Eng., 2022

A Study of Service Registration and Discovery Techniques in Microservice Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2022

Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization.
Proceedings of the International Conference on Networking and Network Applications, 2022

Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Fault-Tolerant Attitude Control for Rigid Spacecraft Without Angular Velocity Measurements.
IEEE Trans. Cybern., 2021

Static Gain Estimation for Automatic Generation Control Systems From Historical Ramp Responses.
IEEE Trans. Control. Syst. Technol., 2021

Fast Fault Detection and Location System for Distribution Network Lines Based on Power Electronic Disturbance Signals.
J. Circuits Syst. Comput., 2021

Nonlinearity model identification for main steam valves based on steady-state data.
Proceedings of the CAA Symposium on Fault Detection, 2021

Variable time delay estimation between time series based on significant change points.
Proceedings of the CAA Symposium on Fault Detection, 2021

2020
Designing Dynamic Alarm Limits and Adjusting Manipulated Variables for Multivariate Systems.
IEEE Trans. Ind. Electron., 2020

Alarm Monitoring for Multivariate Processes Based on a Convex-Hull Normal Operating Zone.
IEEE Trans. Control. Syst. Technol., 2020

Alarm Event Prediction From Historical Alarm Flood Sequences Based on Bayesian Estimators.
IEEE Trans Autom. Sci. Eng., 2020

Multigranulation consensus fuzzy-rough based attribute reduction.
Knowl. Based Syst., 2020

Achieving large and distant ancestral genome inference by using an improved discrete quantum-behaved particle swarm optimization algorithm.
BMC Bioinform., 2020

AnnoGen: annotating genome-wide pragmatic features.
Bioinform., 2020

Identification of Multiple First-Order Continuous-Time Dynamic Models From Special Segments in Historical Data.
IEEE Access, 2020

Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Joint Grid Discretization for Biological Pattern Discovery.
Proceedings of the BCB '20: 11th ACM International Conference on Bioinformatics, 2020

Uncovering the Trust Transfer Mechanisms in a Blockchain-Based Healthcare Platform: A Mixed Method.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Indexing and Designing Deadbands for Industrial Alarm Signals.
IEEE Trans. Ind. Electron., 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019

Determining the number of segments for piece-wise linear representation of discrete-time signals.
Comput. Chem. Eng., 2019

Selection of Root-Cause Process Variables Based on Qualitative Trends in Historical Data Samples.
IEEE Access, 2019

Steady-State Interval Detection and Nonlinear Modeling for Automatic Generation Control Systems.
IEEE Access, 2019

Performance assessment of primary frequency regulation based on static characteristics.
Proceedings of the 58th Annual Conference of the Society of Instrument and Control Engineers of Japan, 2019

Examining Individuals' Ads Click Intention in the Wechat Moments: A Lens of Elaboration Likelihood Model.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

The Application of Machine Learning Algorithms to Diagnose CKD Stages and Identify Critical Metabolites Features.
Proceedings of the Bioinformatics and Biomedical Engineering, 2019

On Industrial Alarm Deadbands for Univariate Analog Signals.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
Multivariate Alarm Systems for Time-Varying Processes Using Bayesian Filters With Applications to Electrical Pumps.
IEEE Trans. Ind. Informatics, 2018

A Layered-Coevolution-Based Attribute-Boosted Reduction Using Adaptive Quantum-Behavior PSO and Its Consistent Segmentation for Neonates Brain Tissue.
IEEE Trans. Fuzzy Syst., 2018

Criteria and Algorithms for Online and Offline Detections of Industrial Alarm Floods.
IEEE Trans. Control. Syst. Technol., 2018

Winter Wheat Production Estimation Based on Environmental Stress Factors from Satellite Observations.
Remote. Sens., 2018

A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

Evolutionary under-sampling based bagging ensemble method for imbalanced data classification.
Frontiers Comput. Sci., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

Searching historical data segments for process identification in feedback control loops.
Comput. Chem. Eng., 2018

An incremental harmonic balance-based approach for harmonic analysis of closed-loop systems with Prandtl-Ishlinskii operator.
Autom., 2018

2017
Design of Alarm Trippoints for Univariate Analog Process Variables Based on Alarm Probability Plots.
IEEE Trans. Ind. Electron., 2017

An efficient semi-supervised representatives feature selection algorithm based on information theory.
Pattern Recognit., 2017

Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

How does web-based virtual reality affect learning: evidences from a quasi-experiment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Estimation of the Most Critical Parameter for the Two-Movement Method to Compensate for Oscillations Caused by Control Valve Stiction.
IEEE Trans. Control. Syst. Technol., 2016

An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems.
IEEE Trans Autom. Sci. Eng., 2016

A fine-grained context-aware access control model for health care and life science linked data.
Multim. Tools Appl., 2016

A robust multi-class AdaBoost algorithm for mislabeled noisy data.
Knowl. Based Syst., 2016

一种基于中介真值程度度量的模糊综合评价方法 (Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree).
计算机科学, 2016

A hierarchical-coevolutionary-MapReduce-based knowledge reduction algorithm with robust ensemble Pareto equilibrium.
Inf. Sci., 2016

Margin distribution explanation on metric learning for nearest neighbor classification.
Neurocomputing, 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

Local Community Detection Based on Bridges Ideas.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

Frequency response analysis for closed-loop systems with hysteresis using incremental harmonic balance.
Proceedings of the 2016 American Control Conference, 2016

Analysis and compensation of control valve stiction-induced limit cycles.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2016

2015
Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method.
IEEE Trans. Autom. Control., 2015

An empirical margin explanation for the effectiveness of DECORATE ensemble learning algorithm.
Knowl. Based Syst., 2015

标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015

A more efficient attribute self-adaptive co-evolutionary reduction algorithm by combining quantum elitist frogs and cloud model operators.
Inf. Sci., 2015

Semi-Supervised Local Fisher Discriminant Analysis Based on Reconstruction Probability Class.
Int. J. Pattern Recognit. Artif. Intell., 2015

A new method to detect and quantify correlated alarms with occurrence delays.
Comput. Chem. Eng., 2015

An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
Bagging-like metric learning for support vector regression.
Knowl. Based Syst., 2014

An FAR-SW based approach for webpage information extraction.
Inf. Syst. Frontiers, 2014

An online method to remove chattering and repeating alarms based on alarm durations and intervals.
Comput. Chem. Eng., 2014

Evaluation of digital baseband modulation schemes for molecular communication in nanonetworks.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

Breast tissue segmentation on MR images using KFCM with spatial constraints.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
Detection of Correlated Alarms Based on Similarity Coefficients of Binary Data.
IEEE Trans Autom. Sci. Eng., 2013

A novel approach to minimum attribute reduction based on quantum-inspired self-adaptive cooperative co-evolution.
Knowl. Based Syst., 2013

A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network.
Knowl. Based Syst., 2013

A sock puppet detection algorithm on virtual spaces.
Knowl. Based Syst., 2013

Principles and Model for Web Dataspace.
J. Comput., 2013

Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

An online method for detection and reduction of chattering alarms due to oscillation.
Comput. Chem. Eng., 2013

Current Attitude Prediction Model Based on Game Theory.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

A novel quantum cooperative co-evolutionary algorithm for large-scale minimum attribute reduction optimization.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
Regularization Path for ν-Support Vector Classification.
IEEE Trans. Neural Networks Learn. Syst., 2012

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD.
IEEE Trans Autom. Sci. Eng., 2012

Accurate on-line v-support vector learning.
Neural Networks, 2012

Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction.
J. Softw., 2012

Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets.
Int. J. Pattern Recognit. Artif. Intell., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

Local margin based semi-supervised discriminant embedding for visual recognition.
Neurocomputing, 2011

Elasto-plastic Collapse Strength Calculation of Casing under Pure External Pressure.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

A Bricklaying Best-Fit Heuristic Algorithm for the Orthogonal Rectangle Packing Problem.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals.
J. Digit. Content Technol. its Appl., 2010

Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning.
J. Digit. Content Technol. its Appl., 2010

Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform.
J. Digit. Content Technol. its Appl., 2010

Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

Ordinal-Class Core Vector Machine.
J. Comput. Sci. Technol., 2010

Subspace identification methods for Hammerstein systems: rank constraint and dimension problem.
Int. J. Control, 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Averaged alarm delay and systematic design for alarm systems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A formal method for integrating distributed ontologies and reducing the redundant relations.
Kybernetes, 2009

Identification of Hammerstein systems without explicit parameterisation of non-linearity.
Int. J. Control, 2009

Revisiting Hammerstein system identification through the Two-Stage Algorithm for bilinear parameter estimation.
Autom., 2009

Identification of linear dynamic systems operating in a networked environment.
Autom., 2009

Anonymous Conditional Proxy Re-encryption without Random Oracle.
Proceedings of the Provable Security, Third International Conference, 2009

An Embedded Load Balancing System for High Speed OC192 Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Study and Safety Analysis on UCONonA Model.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Revisiting the Two-Stage Algorithm for Hammerstein system identification.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

On system identification in a networked environment.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

On-line off-line Ranking Support Vector Machine and analysis.
Proceedings of the International Joint Conference on Neural Networks, 2008

A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Weighted Margin Multi-Class Core Vector Machines.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A blind approach to closed-loop identification of Hammerstein systems.
Int. J. Control, 2007

SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

On Dynamic and Concurrent Model of Web Service Components.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Blind Hammerstein Identification for MR Damper Modeling.
Proceedings of the American Control Conference, 2007

2006
Cyclo-period estimation for discrete-time cyclo-stationary signals.
IEEE Trans. Signal Process., 2006

On Semantic-based cooperation among Web Services.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
On spectral theory of cyclostationary signals in multirate systems.
IEEE Trans. Signal Process., 2005

An Integrated Approach for Mining Meta-rules.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2005

1991
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts.
Proceedings of the Methodologies for Intelligent Systems, 6th International Symposium, 1991


  Loading...