Jianguo Jiang
Orcid: 0000-0002-9349-6337
According to our database1,
Jianguo Jiang
authored at least 151 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Multim., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals.
Comput. Networks, June, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
2022
An End-to-end Heterogeneous Restraint Network for RGB-D Cross-modal Person Re-identification.
ACM Trans. Multim. Comput. Commun. Appl., 2022
Improving Feature Discrimination for Object Tracking by Structural-similarity-based Metric Learning.
ACM Trans. Multim. Comput. Commun. Appl., 2022
Structure-Aware Positional Transformer for Visible-Infrared Person Re-Identification.
IEEE Trans. Image Process., 2022
Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Cogn. Dev. Syst., 2022
Multisource Oscillation Suppression Control of Magnetic Levitation High Speed Permanent Magnet Motor.
IEEE Access, 2022
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
2021
IEEE Trans. Ind. Electron., 2021
Mask-guided dual attention-aware network for visible-infrared person re-identification.
Multim. Tools Appl., 2021
Learning discriminative features with a dual-constrained guided network for video-based person re-identification.
Multim. Tools Appl., 2021
J. Comput. Secur., 2021
Global-Local Graph Convolutional Network for cross-modality person re-identification.
Neurocomputing, 2021
Towards accurate estimation for visual object tracking with multi-hierarchy feature aggregation.
Neurocomputing, 2021
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the Knowledge Science, Engineering and Management, 2021
Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Learning Rubost Features with Refined Spatial Interactions of Inter-part for Person Re-IDentification.
Proceedings of the CCEAI 2021: 5th International Conference on Control Engineering and Artificial Intelligence, 2021
2020
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data.
Wirel. Commun. Mob. Comput., 2020
A Task-Oriented Heuristic for Repairing Infeasible Solutions to Overlapping Coalition Structure Generation.
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
A Cross-Modal Multi-granularity Attention Network for RGB-IR Person Re-identification.
Neurocomputing, 2020
A Fast and Intelligent Open-Circuit Fault Diagnosis Method for a Five-Level NNPP Converter Based on an Improved Feature Extraction and Selection Model.
IEEE Access, 2020
Impedance Modeling and Stability Analysis of the IMAF-PLL-Based NPC Three-Level LCL Grid-Connected Inverter.
IEEE Access, 2020
IEEE Access, 2020
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2020
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020
CS-Dict: Accurate Indoor Localization with CSI Selective Amplitude and Phase Based Regularized Dictionary Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
2019
Independent metric learning with aligned multi-part features for video-based person re-identification.
Multim. Tools Appl., 2019
Deep feature representation and multiple metric ensembles for person re-identification in security surveillance system.
Multim. Tools Appl., 2019
Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019
IEEE Access, 2019
Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019
Proceedings of the Knowledge Science, Engineering and Management, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
2018
SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking.
IEEE Trans. Multim., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
A reliable speed controller for suppressing low frequency concussion of electric vehicle.
Microelectron. Reliab., 2018
CoRR, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the Knowledge Science, Engineering and Management, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems.
IEEE Trans. Reliab., 2017
IEEE Trans. Image Process., 2017
IEEE Trans. Image Process., 2017
Multim. Tools Appl., 2017
Int. J. Imaging Syst. Technol., 2017
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Design of T-type three-level energy storage inverter and grid-connected control strategy.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Fast finite control set model predictive control for three-phase five-level nested neutral point piloted converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Multim. Tools Appl., 2016
基于低秩稀疏分解与协作表示的图像分类算法 (Image Classification Algorithm Based on Low Rank and Sparse Decomposition and Collaborative Representation).
计算机科学, 2016
Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games.
J. Comput. Sci. Technol., 2016
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Intelligent Visual Surveillance - 4th Chinese Conference, 2016
Proceedings of the Intelligent Information Processing VIII, 2016
Proceedings of the Intelligent Information Processing VIII, 2016
2015
IEEE Signal Process. Lett., 2015
Image classification based on low-rank matrix recovery and Naive Bayes collaborative representation.
Neurocomputing, 2015
Appl. Intell., 2015
A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
2014
Inf. Sci., 2014
Inf. Sci., 2014
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014
2013
IEEE Trans. Medical Imaging, 2013
<i>ε</i>-<i>Isometry</i>ε-Isometry based shape approximation for image content representation.
Signal Process., 2013
A Monte Carlo Enhanced PSO Algorithm for Optimal QoM in Multi-Channel Wireless Networks.
J. Comput. Sci. Technol., 2013
J. Comput., 2013
Active learning based intervertebral disk classification combining shape and texture similarities.
Neurocomputing, 2013
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013
Systematic modeling and control of indirect modular multilevel converter (MMC) with grid unbalance estimation.
Proceedings of the IECON 2013, 2013
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013
2012
J. Syst. Sci. Complex., 2012
Robust Anatomical Correspondence Detection by Graph Matching with Sparsity Constraint.
Proceedings of the Medical Computer Vision. Recognition Techniques and Applications in Medical Imaging, 2012
2011
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011
ACM Trans. Multim. Comput. Commun. Appl., 2011
J. Softw., 2011
J. Comput. Phys., 2011
Int. J. Autom. Comput., 2011
A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions.
Appl. Soft Comput., 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
2010
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling.
J. Multim., 2010
Inf. Sci., 2010
Proceedings of the Advances in Multimedia Modeling, 2010
2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Research on Comprehensive Evaluation of Agent Coalition Based on D-S Evidential Reasoning.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006
2004
Solution to Agent Coalition Problem using Improved Ant Colony Optimization Algorithm.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004
2001
Two quadrants control of the switched reluctance motor drive for application in electric drive bicycle.
Proceedings of the IEEE International Conference on Systems, 2001