Jianfeng Wang

Orcid: 0009-0007-7091-5563

According to our database1, Jianfeng Wang authored at least 377 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Towards forward secure verifiable data streaming with support for keyword query.
Inf. Sci., 2025

2024
Hierarchical Multimodal Graph Learning for Outfit Compatibility Modelling.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2024

A Dual-Functional Sensing-Communication Waveform Design Based on OFDM.
IEEE Trans. Wirel. Commun., November, 2024

Experimental Study on ISAC Performance With Different Sensing Sequences.
IEEE Commun. Lett., November, 2024

A finger-inspired pneumatic network actuator based on rigid-flexible coupling structure for soft robotic grippers.
Intell. Serv. Robotics, July, 2024

Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024

Heterogeneous-Grained Multi-Modal Graph Network for Outfit Recommendation.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2024

Bipartite graphs with all but two eigenvalues equal to 0 and ±1.
Discret. Math., April, 2024

A Module-Level Configuration Methodology for Programmable Camouflaged Logic.
ACM Trans. Design Autom. Electr. Syst., March, 2024

On the order of antipodal covers.
J. Graph Theory, February, 2024

Research on a hierarchical feature-based contour extraction method for spatial complex truss-like structures in aerial images.
Eng. Appl. Artif. Intell., January, 2024

The diameter and eccentricity eigenvalues of graphs.
Discret. Math. Algorithms Appl., January, 2024

Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data.
IEEE Trans. Netw. Sci. Eng., 2024

Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
IACR Cryptol. ePrint Arch., 2024

Scalable Equi-Join Queries over Encrypted Database.
IACR Cryptol. ePrint Arch., 2024

Lightweight verifiable blockchain top-k queries.
Future Gener. Comput. Syst., 2024

Spectral extrema of 1-planar graphs.
Discret. Math., 2024

Graphs with large multiplicity of -2 in the spectrum of the eccentricity matrix.
Discret. Math., 2024

Spectral spread and trace norm of eccentricity matrix of graphs.
Discret. Appl. Math., 2024

SlowFast-VGen: Slow-Fast Learning for Action-Driven Long Video Generation.
CoRR, 2024

EditRoom: LLM-parameterized Graph Diffusion for Composable 3D Room Layout Editing.
CoRR, 2024

Serverless Cold Starts and Where to Find Them.
CoRR, 2024

MM-Vet v2: A Challenging Benchmark to Evaluate Large Multimodal Models for Integrated Capabilities.
CoRR, 2024

MMWorld: Towards Multi-discipline Multi-faceted World Model Evaluation in Videos.
CoRR, 2024

Motion Consistency Model: Accelerating Video Diffusion with Disentangled Motion-Appearance Distillation.
CoRR, 2024

List Items One by One: A New Data Source and Learning Paradigm for Multimodal LLMs.
CoRR, 2024

Exploring Probabilistic Models for Semi-supervised Learning.
CoRR, 2024

Entity6K: A Large Open-Domain Evaluation Dataset for Real-World Entity Recognition.
CoRR, 2024

COSMO: COntrastive Streamlined MultimOdal Model with Interleaved Pre-Training.
CoRR, 2024

Differentiating anticipatory and consummatory reward processing in problematic pornography use: An event-related potential analysis of reward dynamics.
Comput. Hum. Behav., 2024

Beamforming Optimization for Multiuser ISAC With Transceiver Hardware Impairments.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

YuanRong: A Production General-purpose Serverless System for Distributed Applications in the Cloud.
Proceedings of the ACM SIGCOMM 2024 Conference, 2024

OpenLEAF: A Novel Benchmark for Open-Domain Interleaved Image-Text Generation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Bring Metric Functions into Diffusion Models.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

MM-Vet: Evaluating Large Multimodal Models for Integrated Capabilities.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Mitigating Hallucination in Large Multi-Modal Models via Robust Instruction Tuning.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

IDOL: Unified Dual-Modal Latent Diffusion for Human-Centric Joint Video-Depth Generation.
Proceedings of the Computer Vision - ECCV 2024, 2024

Idea2Img: Iterative Self-refinement with GPT-4V for Automatic Image Design and Generation.
Proceedings of the Computer Vision - ECCV 2024, 2024

GRiT: A Generative Region-to-Text Transformer for Object Understanding.
Proceedings of the Computer Vision - ECCV 2024, 2024

TroScan: Enhancing On-Chip Delivery Resilience to Physical Attack Through Frequency-Triggered Key Generation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

MM-Narrator: Narrating Long-form Videos with Multimodal In-Context Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

MMSum: A Dataset for Multimodal Summarization and Thumbnail Generation of Videos.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Segment and Caption Anything.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Data-Driven Adaptive Dynamic Programming for Nonlinear Systems with State and Input Constraints.
Proceedings of the 10th International Conference on Control, 2024

CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Research on Temporal Graph for Link Prediction Method Based on Deep Learning.
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024

2023
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023

Defect evolution in GaN thin film heterogeneously integrated with CMOS-compatible Si(100) substrate by ion-cutting technology.
Sci. China Inf. Sci., November, 2023

Modeling and Characterization of the Detection and Suppression of Bogus Messages in Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., October, 2023

One for all: Efficient verifiable dynamic multi-user searchable encryption in the presence of corrupted users.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

An Intelligent Defect Detection Approach Based on Cascade Attention Network Under Complex Magnetic Flux Leakage Signals.
IEEE Trans. Ind. Electron., July, 2023

On graphs with exactly one anti-adjacency eigenvalue and beyond.
Discret. Math., June, 2023

Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023

Signed graphs with integral net Laplacian spectrum.
AKCE Int. J. Graphs Comb., May, 2023

Sharp spectral bounds for the vertex-connectivity of regular graphs.
J. Comb. Optim., March, 2023

The Research of Resource Allocation Method Based on GCN-LSTM in 5G Network.
IEEE Commun. Lett., March, 2023

The weighted vertex PI index of tricyclic graphs.
Discret. Appl. Math., March, 2023

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems.
IEEE Trans. Parallel Distributed Syst., February, 2023

Topological indices of the wreath product of graphs.
Discret. Math. Algorithms Appl., January, 2023

Video Denoising for Scenes With Challenging Motion: A Comprehensive Analysis and a New Framework.
IEEE Trans. Multim., 2023

TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support.
IEEE Trans. Dependable Secur. Comput., 2023

Teleoperation of Wheeled Mobile Robot With Dynamic Longitudinal Slippage.
IEEE Trans. Control. Syst. Technol., 2023

Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023

A Fast Detection Method Using Anisotropic Guidance for Infrared Small Target Under Complex Scenes.
IEEE Geosci. Remote. Sens. Lett., 2023

Statistical learning for train delays and influence of winter climate and atmospheric icing.
J. Rail Transp. Plan. Manag., 2023

A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces, 2023

InfoVisDial: An Informative Visual Dialogue Dataset by Bridging Large Multimodal and Language Models.
CoRR, 2023

Interfacing Foundation Models' Embeddings.
CoRR, 2023

GPT-4V in Wonderland: Large Multimodal Models for Zero-Shot Smartphone GUI Navigation.
CoRR, 2023

MM-VID: Advancing Video Understanding with GPT-4V(ision).
CoRR, 2023

DEsignBench: Exploring and Benchmarking DALL-E 3 for Imagining Visual Design.
CoRR, 2023

Idea2Img: Iterative Self-Refinement with GPT-4V(ision) for Automatic Image Design and Generation.
CoRR, 2023

OpenLEAF: Open-Domain Interleaved Image-Text Generation and Evaluation.
CoRR, 2023

The Dawn of LMMs: Preliminary Explorations with GPT-4V(ision).
CoRR, 2023

Spatial-Frequency U-Net for Denoising Diffusion Probabilistic Models.
CoRR, 2023

Aligning Large Multi-Modal Model with Robust Instruction Tuning.
CoRR, 2023

MultiSum: A Dataset for Multimodal Summarization and Thumbnail Generation of Videos.
CoRR, 2023

Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs.
CoRR, 2023

NUWA-XL: Diffusion over Diffusion for eXtremely Long Video Generation.
CoRR, 2023

MM-REACT: Prompting ChatGPT for Multimodal Reasoning and Action.
CoRR, 2023

NP-Match: Towards a New Probabilistic Model for Semi-Supervised Learning.
CoRR, 2023

Relation patterns extraction from high-dimensional climate data with complicated multi-variables using deep neural networks.
Appl. Intell., 2023

Pre Synchronization Control Strategy of Virtual Synchronous Generator (VSG) in Micro-Grid.
IEEE Access, 2023

Chinese Medical Named Entity Recognition Based on Fusion of Global Features and Multi-Local Features.
IEEE Access, 2023

A complete characterization of graphs with exactly two positive eigenvalues.
Adv. Appl. Math., 2023

Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Segment Everything Everywhere All at Once.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning 3D Photography Videos via Self-supervised Diffusion on Single Images.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Cross-Intent Graph Contrastive Learning for Fashion Sequential Recommendation.
Proceedings of the 28th International Conference on Automation and Computing, 2023

NP-SemiSeg: When Neural Processes meet Semi-Supervised Semantic Segmentation.
Proceedings of the International Conference on Machine Learning, 2023

Prompting GPT-3 To Be Reliable.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Zero-Shot Human-Object Interaction (HOI) Classification by Bridging Generative and Contrastive Image-Language Models.
Proceedings of the IEEE International Conference on Image Processing, 2023

TSMix: time series data augmentation by mixing sources.
Proceedings of the 3rd Workshop on Machine Learning and Systems, 2023

FoldFormer: sequence folding and seasonal attention for fine-grained long-term FaaS forecasting.
Proceedings of the 3rd Workshop on Machine Learning and Systems, 2023

Generalized Decoding for Pixel, Image, and Language.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

ReCo: Region-Controlled Text-to-Image Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Detection Hub: Unifying Object Detection Datasets via Query Adaptation on Language Embedding.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

How Does It Function?: Characterizing Long-term Trends in Production Serverless Workloads.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

WeightLock: A Mixed-Grained Weight Encryption Approach Using Local Decrypting Units for Ciphertext Computing in DNN Accelerators.
Proceedings of the 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2023

NUWA-XL: Diffusion over Diffusion for eXtremely Long Video Generation.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

GIT: A Generative Image-to-text Transformer for Vision and Language.
Trans. Mach. Learn. Res., 2022

Adversarial Feature Augmentation and Normalization for Visual Recognition.
Trans. Mach. Learn. Res., 2022

Effective approximation of high-dimensional space using neural networks.
J. Supercomput., 2022

A Pipeline Defect Inversion Method With Erratic MFL Signals Based on Cascading Abstract Features.
IEEE Trans. Instrum. Meas., 2022

TBDA-Net: A Task-Based Bias Domain Adaptation Network Under Industrial Small Samples.
IEEE Trans. Ind. Informatics, 2022

Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

Convolutional Neural Networks With Gated Recurrent Connections.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Off-Policy: Model-Free Optimal Synchronization Control for Complex Dynamical Networks.
Neural Process. Lett., 2022

Infrared Small Target Detection Using Local Component Uncertainty Measure With Consistency Assessment.
IEEE Geosci. Remote. Sens. Lett., 2022

Modeling and control of a quadrotor tail-sitter unmanned aerial vehicles.
J. Syst. Control. Eng., 2022

Learning intents behind interactions with high-order graph for session-based intelligent recommendation.
J. Intell. Fuzzy Syst., 2022

A voltage fluctuation compensation control strategy at DC side for integrated power quality control device.
Int. J. Circuit Theory Appl., 2022

Efficient and non-interactive ciphertext range query based on differential privacy.
Int. J. Comput. Sci. Eng., 2022

New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

Exploring Discrete Diffusion Models for Image Captioning.
CoRR, 2022

ALL-MASK: A Reconfigurable Logic Locking Method for Multicore Architecture with Sequential-Instruction-Oriented Key.
CoRR, 2022

The Overlooked Classifier in Human-Object Interaction Recognition.
CoRR, 2022

A Comparison of Metaheuristic Techniques for Solving Optimal Sitting and Sizing Problems of Capacitor Banks to Reduce the Power Loss in Radial Distribution System.
Complex., 2022

Learning compatibility knowledge for outfit recommendation with complementary clothing matching.
Comput. Commun., 2022

On the Zero Forcing Number and Spectral Radius of Graphs.
Electron. J. Comb., 2022

Spectral determination of graphs with one positive anti-adjacency eigenvalue.
Appl. Math. Comput., 2022

Multiple Genetic Syndromes Recognition Based on a Deep Learning Framework and Cross-Loss Training.
IEEE Access, 2022

Spectral determinations and eccentricity matrix of graphs.
Adv. Appl. Math., 2022

Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

NUWA-Infinity: Autoregressive over Autoregressive Generation for Infinite Visual Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Coarse-to-Fine Vision-Language Pre-training with Fusion in the Backbone.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Knowledge-Enhanced Visual Question Answering with Multi-modal Joint Guidance.
Proceedings of the 11th International Joint Conference on Knowledge Graphs, 2022

An 8T/Cell FeFET-Based Nonvolatile SRAM with Improved Density and Sub-fJ Backup and Restore Energy.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

Attribute Guided Graph Convolutional Network with Stronger Generalization for Person Re-identification.
Proceedings of the 27th International Conference on Automation and Computing, 2022

Dynamic Edge-Based Graph Attention Network and Visual-Semantic Embedding for Outfits Recommendation.
Proceedings of the 27th International Conference on Automation and Computing, 2022

An Improved YOLOv5 Real-time Detection Method for Aircraft Target Detection.
Proceedings of the 27th International Conference on Automation and Computing, 2022

NP-Match: When Neural Processes meet Semi-Supervised Learning.
Proceedings of the International Conference on Machine Learning, 2022

UniTAB: Unifying Text and Box Outputs for Grounded Vision-Language Modeling.
Proceedings of the Computer Vision - ECCV 2022, 2022

A Simple Approach and Benchmark for 21, 000-Category Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Rethinking Bayesian Deep Learning Methods for Semi-Supervised Volumetric Medical Image Segmentation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Injecting Semantic Concepts into End-to-End Image Captioning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

An Empirical Study of Training End-to-End Vision-and-Language Transformers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Scaling Up Vision-Language Pretraining for Image Captioning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Quadrant: a cloud-deployable NF virtualization platform.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

MHKD-MVQA: Multimodal Hierarchical Knowledge Distillation for Medical Visual Question Answering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

An Empirical Study of GPT-3 for Few-Shot Knowledge-Based VQA.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Analytical Study of Stator Tooth Modulation on Electromagnetic Radial Force in Permanent Magnet Synchronous Machines.
IEEE Trans. Ind. Electron., 2021

Slippage-Dependent Teleoperation of Wheeled Mobile Robots on Soft Terrains.
IEEE Robotics Autom. Lett., 2021

Synthetic polarization-sensitive optical coherence tomography by deep learning.
npj Digit. Medicine, 2021

Effects of winter climate on delays of high speed passenger trains in Botnia-Atlantica region.
J. Rail Transp. Plan. Manag., 2021

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

Neural networks trained with high-dimensional functions approximation data in high-dimensional space.
J. Intell. Fuzzy Syst., 2021

LLA: Loss-aware label assignment for dense pedestrian detection.
Neurocomputing, 2021

On the eigenvalues of eccentricity matrix of graphs.
Discret. Appl. Math., 2021

Secure deduplication with efficient user revocation in cloud storage.
Comput. Stand. Interfaces, 2021

Verifiable database supporting keyword searches with forward security.
Comput. Stand. Interfaces, 2021

Decoupling Object Detection from Human-Object Interaction Recognition.
CoRR, 2021

Scaling Up Vision-Language Pre-training for Image Captioning.
CoRR, 2021

Crossing the Format Boundary of Text and Boxes: Towards Unified Vision-Language Modeling.
CoRR, 2021

Florence: A New Foundation Model for Computer Vision.
CoRR, 2021

UFO: A UniFied TransfOrmer for Vision-Language Representation Learning.
CoRR, 2021

Edge Prior Augmented Networks for Motion Deblurring on Naturally Blurry Images.
CoRR, 2021

Is Object Detection Necessary for Human-Object Interaction Recognition?
CoRR, 2021

Galleon: Reshaping the Square Peg of NFV.
CoRR, 2021

Modeling analysis of ionic polymer-metal composites sensors with various sizes.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

A Novel Path Planning Approach with Bidirectional A* Algorithm Based on Road Characteristics.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

Learning Outfit Compatibility with Graph Attention Network and Visual-Semantic Embedding.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

SEED: Self-supervised Distillation For Visual Representation.
Proceedings of the 9th International Conference on Learning Representations, 2021

Design and Motion Analysis of a Pneumatic Soft Active Structure to Imitate Neck Muscle.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

End-to-End Semi-Supervised Object Detection with Soft Teacher.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Compressing Visual-linguistic Model via Knowledge Distillation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

NICE: Neural Image Commenting with Empathy.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

DSP Enabled, Amplitude Modulation Pilot Tone Based Optical Performance Monitoring in Coherent Systems.
Proceedings of the European Conference on Optical Communication, 2021

DAP: Detection-Aware Pre-Training With Weak Supervision.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

TAP: Text-Aware Pre-Training for Text-VQA and Text-Caption.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

End-to-End Object Detection With Fully Convolutional Network.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

RSG: A Simple but Effective Module for Learning Imbalanced Datasets.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Spallation Analysis of Concrete Under Pulse Load Based on Peridynamic Theory.
Wirel. Pers. Commun., 2020

Learning Context-Aware Outfit Recommendation.
Symmetry, 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

Tied gender condition for facial expression recognition with deep random forest.
J. Electronic Imaging, 2020

Blockchain-based public auditing and secure deduplication with fair arbitration.
Inf. Sci., 2020

Client-side ciphertext deduplication scheme with flexible access control.
Int. J. Comput. Sci. Eng., 2020

Efficient self-adaptive access control for personal medical data in emergency setting.
Int. J. Comput. Sci. Eng., 2020

Statistical inference for the block sparsity of complex-valued signals.
IET Signal Process., 2020

Graphs whose <i>A<sub>α</sub></i> radius does not exceed 2.
Discuss. Math. Graph Theory, 2020

Spectral properties of the eccentricity matrix of graphs.
Discret. Appl. Math., 2020

MiniVLM: A Smaller and Faster Vision-Language Model.
CoRR, 2020

AutoAssign: Differentiable Label Assignment for Dense Object Detection.
CoRR, 2020

Hashing-based Non-Maximum Suppression for Crowded Object Detection.
CoRR, 2020

Blockchain-based multiple groups data sharing with anonymity and traceability.
Sci. China Inf. Sci., 2020

Anchor Box Optimization for Object Detection.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

Pair-Wise Convolution Network with Transformers for Sequential Recommendation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Dynamic Graph Attention-Aware Networks for Session-Based Recommendation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Direct Nonlinear Noise Monitoring for In-Service Signals in Coherent Systems.
Proceedings of the European Conference on Optical Communications, 2020

Boosting Weakly Supervised Object Detection with Progressive Knowledge Transfer.
Proceedings of the Computer Vision - ECCV 2020, 2020

Label Distribution Learning on Auxiliary Label Space Graphs for Facial Expression Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Meeting SLOs in cross-platform NFV.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Towards efficient privacy-preserving encrypted image search in cloud computing.
Soft Comput., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

The maximum PI index of bicyclic graphs with even number of edges.
Inf. Process. Lett., 2019

Multi-device anonymous authentication.
Int. J. Inf. Sec., 2019

Large universe multi-authority attribute-based PHR sharing with user revocation.
Int. J. Comput. Sci. Eng., 2019

On the Eigenvalues Distribution in Threshold Graphs.
Graphs Comb., 2019

Graph energy based on the eccentricity matrix.
Discret. Math., 2019

Enhanced block sparse signal recovery based on q-ratio block constrained minimal singular values.
CoRR, 2019

Learning to Count Objects with Few Exemplar Annotations.
CoRR, 2019

WIDER Face and Pedestrian Challenge 2018: Methods and Results.
CoRR, 2019

The weighted vertex PI index of (<i>n, m</i>)-graphs with given diameter.
Appl. Math. Comput., 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing.
IEEE Access, 2019

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019

Kinematic Teleoperation of Wheeled Mobile Robot With Slippage Compensation on Soft Terrains.
IEEE Access, 2019

Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Facial Motion Prior Networks for Facial Expression Recognition.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Fault Tolerant Control Approach for the Solar-Powered HALE UAV.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2019

Using Multi-layer Coding Genetic Algorithm to Solve Time-Critical Task Assignment of Heterogeneous UAV Teaming.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2019

Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Proceedings of the Computer Security - ESORICS 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

High Frequency Residual Learning for Multi-Scale Image Classification.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

Hierarchically Structured Reinforcement Learning for Topically Coherent Visual Story Generation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
First-Person Daily Activity Recognition With Manipulated Object Proposals and Non-Linear Feature Fusion.
IEEE Trans. Circuits Syst. Video Technol., 2018

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018

Verifiable memory leakage-resilient dynamic searchable encryption.
J. High Speed Networks, 2018

An efficient traceable data sharing scheme in cloud computing for mobile devices.
Int. J. High Perform. Comput. Netw., 2018

Efficient VLR group signatures for smart cards.
Int. J. Embed. Syst., 2018

The anti-adjacency matrix of a graph: Eccentricity matrix.
Discret. Appl. Math., 2018

The weighted vertex PI index of bicyclic graphs.
Discret. Appl. Math., 2018

Revisit Multinomial Logistic Regression in Deep Learning: Data Dependent Model Initialization for Image Recognition.
CoRR, 2018

SFace: An Efficient Network for Face Detection in Large Scale Variations.
CoRR, 2018

The impact of organisational support, technical support, and self-efficacy on faculty perceived benefits of using learning management system.
Behav. Inf. Technol., 2018

On the first reformulated Zagreb indices of graphs with a given clique number.
Ars Comb., 2018

Spectral characterizations of graphs with at most two (signless) Laplacian eigenvalues greater than 2.
Ars Comb., 2018

Open problems in the spectral theory of signed graphs.
Art Discret. Appl. Math., 2018

A Hybrid BP-VMP-EP Localization Algorithm for Passive MIMO Radar Networks.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Opportunistic Concurrency Transmission MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Multi-channel Parallel Negotiation MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Multi-Beam Multiple Access Scheme for Uplink Traffic of Wireless Virtual Reality with Millimeter-Wave Analog Beamforming.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

An Associated Deletion Scheme for Multi-copy in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

2017
Facial Age Estimation With Age Difference.
IEEE Trans. Image Process., 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Bounds on the PI index of unicyclic and bicyclic graphs with given girth.
Discret. Appl. Math., 2017

Face Attention Network: An Effective Face Detector for the Occluded Faces.
CoRR, 2017

Oriented Bicyclic Graphs with the First Five Large Skew Energies.
Ars Comb., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

Gated Recurrent Convolution Neural Network for OCR.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

An omnidirectional mobile operating robot based on mecanum wheel.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

An Indoor Precise Positioning Algorithm Using 60GHz Millimeter-Wave Based on the Optimal Path Search.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
A Distance-Computation-Free Search Scheme for Binary Code Databases.
IEEE Trans. Multim., 2016

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Height Profile Estimation of Power Lines Based on Two-Dimensional CSAR Imagery.
IEEE Geosci. Remote. Sens. Lett., 2016

Secure searchable encryption: a survey.
J. Commun. Inf. Networks, 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Sci. Eng., 2016

Model-based target decomposition with the π/4 mode compact polarimetry data.
Sci. China Inf. Sci., 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Study on fine feature description of multi-aspect SAR observations.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs.
Proceedings of the 2016 International Conference on Information Networking, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Optimized Cartesian K-Means.
IEEE Trans. Knowl. Data Eng., 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive Mob. Comput., 2015

Combinatorial Test Suites Generation Method Based on Fuzzy Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2015

Group $K$-Means.
CoRR, 2015

Secure Outsourcing of Modular Exponentiation with Single Untrusted Server.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A novel saliency-based object segmentation method for seriously degenerated images.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Online optimal power control of offshore oil-platform power systems based on interior point and fast branch-bound methods.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A novel stack package solution of AC-DC chip for high-power density adapters.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
A New Method for Multiple Finite-Element Models in Cosimulation With Electrical Circuit Using Machine Multiloop Modeling Scheme.
IEEE Trans. Ind. Electron., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

A 2.5-Mbps, 170-cm transmission distance IntraBody communication receiver front end design and its synchronization technique research.
Proceedings of the IEEE 57th International Midwest Symposium on Circuits and Systems, 2014

Optimized Distances for Binary Code Ranking.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

Online/Offline Attribute Based Signature.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Simplifying HOG arithmetic for speedy hardware realization.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014

2013
Zigbee light link and its applicationss.
IEEE Wirel. Commun., 2013

Oroxylin A Inhibits Hemolysis via Hindering the Self-Assembly of α-Hemolysin Heptameric Transmembrane Pore.
PLoS Comput. Biol., 2013

Security Analysis on a Timestamp-based Remote User Authentication Scheme.
J. Comput., 2013

Signless Laplacian eigenvalues and circumference of graphs.
Discret. Appl. Math., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

The impact of faculty perceived reconfigurability of learning management systems on effective teaching practices.
Comput. Educ., 2013

Almost every complement of a tadpole graph is not chromatically unique.
Ars Comb., 2013

Experimental comparison of terabit nyquist superchannel transmissions based on high and low baud rates.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Order preserving hashing for approximate nearest neighbor search.
Proceedings of the ACM Multimedia Conference, 2013

An efficiency-enhanced wireless power transfer system with segmented transmitting coils for endoscopic capsule.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2012
A Capacitor-Isolated LED Driver With Inherent Current Balance Capability.
IEEE Trans. Ind. Electron., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

3D scene reconstruction by multiple structured-light based commodity depth cameras.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Analysis of QoS Provisioning in Cognitive Radio Networks: A Case Study.
Wirel. Pers. Commun., 2011

Multimedia Cloud Computing.
IEEE Signal Process. Mag., 2011

The Influence of Information Control upon On-line Shopping Behavior.
Int. J. Technol. Hum. Interact., 2011

An Exploratory Study of How Technology Supports Communication in Multilingual Groups.
Int. J. e Collab., 2011

Emerging cognitive radio applications: A survey.
IEEE Commun. Mag., 2011

How to solve the polynomial ordinary differential equations.
Appl. Math. Comput., 2011

Text Clustering Based on LSA-HGSOM.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Applications, challenges, and prospective in emerging body area networking technologies.
IEEE Wirel. Commun., 2010

A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective.
J. Organ. End User Comput., 2010

A Study of the Impact of Individual Differences on Online Shopping.
Int. J. E Bus. Res., 2010

On the Index of Necklaces.
Graphs Comb., 2010

On the spectral characterizations of ∞-graphs.
Discret. Math., 2010

On the two largest Q-eigenvalues of graphs.
Discret. Math., 2010

Spectral Characterizations of Dumbbell Graphs.
Electron. J. Comb., 2010

Distance learning success - a perspective from socio-technical systems theory.
Behav. Inf. Technol., 2010

Some results on the signless Laplacians of graphs.
Appl. Math. Lett., 2010

A new approach for image retrieval with integrated Euclidean distance and rotational correlation.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Research and Design of General Report Form System.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Design and research of fire early warning system based on topological structure for forest.
Proceedings of the Third International Workshop on Advanced Computational Intelligence, 2010

Design and research on monitoring and alarming system for mine.
Proceedings of the Third International Workshop on Advanced Computational Intelligence, 2010

2009
Directional medium access control for ad hoc networks.
Wirel. Networks, 2009

Performance of a burst-frame-based CSMA/CA protocol: Analysis and enhancement.
Wirel. Networks, 2009

The cospectral equivalence classes of graphs having an isolated vertex.
Comput. Math. Appl., 2009

A new expression for the adjoint polynomial of a path.
Australas. J Comb., 2009

Services-Oriented CRM System and Enabling Technologies for Insurance Enterprises.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Feasibility Study of Sensing TV Whitespace with Local Quiet Zone.
Proceedings of the IEEE International Conference on Systems, 2009

Finite-Time Boundedness Analysis of a Class of Neutral Type Neural Networks with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Globally Exponentially Attractive Set and Synchronization of a Class of Chaotic Finance System.
Proceedings of the Advances in Neural Networks, 2009

A Case Study of QoS Provisioning in TV-Band Cognitive Radio Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
The chromatic equivalence class of graph <i>‾{B<sub>n-6, 12</sub>}</i>.
Discuss. Math. Graph Theory, 2008

A complete solution to the chromatic equivalence class of graph <i>I</i>.
Discret. Math., 2008

Trees with m-matchings and the fourth and fifth minimal Hosoya index.
Comput. Math. Appl., 2008

Covert Communication Based on Subliminal Channel in Broadcast Multi Signature.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Cognitive Radio Based Wireless Sensor Networks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Fan Fault Diagnosis System Based on Virtual Prototyping Technology.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Enhancing the performance of medium access control for WLANs with multi-beam access point.
IEEE Trans. Wirel. Commun., 2007

Maximum flow problem in wireless ad hoc networks with directional antennas.
Optim. Lett., 2007

System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX.
IEEE J. Sel. Areas Commun., 2007

Topic Effects on Process Gains and Losses in Electronic Meetings.
Inf. Resour. Manag. J., 2007

Achieving maximum flow in interference-aware wireless sensor networks with smart antennas.
Ad Hoc Networks, 2007

2006
Medium access control in mobile <i>ad hoc</i> networks: challenges and solutions.
Wirel. Commun. Mob. Comput., 2006

Providing statistical QoS guarantee for voice over IP in the IEEE 802.11 wireless LANs.
IEEE Wirel. Commun., 2006

DUCHA: A New Dual-Channel MAC Protocol for Multihop Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2006

OMAR: Utilizing Multiuser Diversity in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

The estimation of sample size in multi-stage sampling and its application in medical survey.
Appl. Math. Comput., 2006

Performance of a burst-frame-based CSMA/CA protocol for high data rate ultra-wideband networks: analysis and enhancement.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Open Wireless Software Radio on Common PC.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance and Analysis of CDM-FH-OFDMA for Broadband Wireless Systems.
Proceedings of the NETWORKING 2006, 2006

Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels.
Proceedings of the NETWORKING 2006, 2006

A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Receiver design for OFDM-CDMA systems with multiplexed STBC.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Uplink medium access control for WLANs with multi-beam access point.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Distributed packet scheduling for multihop flows in ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic packet Scheduling and Media Access control for wireless LANs and multi-hop ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic media access control and rate adaptation for wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

2001
Adaptive mobile multimedia QoS control and resource management.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Integrating information systems in electric utilities.
Proceedings of the IEEE International Conference on Systems, 2000


  Loading...