Jianguo Jiang

Orcid: 0000-0002-9349-6337

According to our database1, Jianguo Jiang authored at least 150 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SYRER: Synergistic Relational Reasoning for RGB-D Cross-Modal Re-Identification.
IEEE Trans. Multim., 2024

GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals.
Comput. Networks, June, 2023

UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Dynamic Malicious Document Detection Method Based on Multi-Memory Features.
Proceedings of the Advances in Digital Forensics XIX, 2023

2022
An End-to-end Heterogeneous Restraint Network for RGB-D Cross-modal Person Re-identification.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Improving Feature Discrimination for Object Tracking by Structural-similarity-based Metric Learning.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Structure-Aware Positional Transformer for Visible-Infrared Person Re-Identification.
IEEE Trans. Image Process., 2022

Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., 2022

STEG-Net: Spatiotemporal Edge Guidance Network for Video Salient Object Detection.
IEEE Trans. Cogn. Dev. Syst., 2022

Multisource Oscillation Suppression Control of Magnetic Levitation High Speed Permanent Magnet Motor.
IEEE Access, 2022

A Large Scale Document-Term Matching Method Based on Information Retrieval.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
A Г-Source Circuit Breaker for DC Microgrid Protection.
IEEE Trans. Ind. Electron., 2021

Mask-guided dual attention-aware network for visible-infrared person re-identification.
Multim. Tools Appl., 2021

Learning discriminative features with a dual-constrained guided network for video-based person re-identification.
Multim. Tools Appl., 2021

FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.
J. Comput. Secur., 2021

Global-Local Graph Convolutional Network for cross-modality person re-identification.
Neurocomputing, 2021

Towards accurate estimation for visual object tracking with multi-hierarchy feature aggregation.
Neurocomputing, 2021

An end-to-end text spotter with text relation networks.
Cybersecur., 2021

NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Landscape-Enhanced Graph Attention Network for Rumor Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning.
Proceedings of the Advances in Digital Forensics XVII, 2021

A Residual Fingerprint-Based Defense Against Adversarial Deepfakes.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Learning Rubost Features with Refined Spatial Interactions of Inter-part for Person Re-IDentification.
Proceedings of the CCEAI 2021: 5th International Conference on Control Engineering and Artificial Intelligence, 2021

2020
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data.
Wirel. Commun. Mob. Comput., 2020

A Task-Oriented Heuristic for Repairing Infeasible Solutions to Overlapping Coalition Structure Generation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Person Attribute Recognition by Sequence Contextual Relation Learning.
IEEE Trans. Circuits Syst. Video Technol., 2020

A Cross-Modal Multi-granularity Attention Network for RGB-IR Person Re-identification.
Neurocomputing, 2020

A Fast and Intelligent Open-Circuit Fault Diagnosis Method for a Five-Level NNPP Converter Based on an Improved Feature Extraction and Selection Model.
IEEE Access, 2020

Impedance Modeling and Stability Analysis of the IMAF-PLL-Based NPC Three-Level LCL Grid-Connected Inverter.
IEEE Access, 2020

Enhanced Grid-Connected Phase-Locked Loop Based on a Moving Average Filter.
IEEE Access, 2020

Depthwise Separable Convolutional Neural Network for Confidential Information Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2020

SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2020

CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020

CS-Dict: Accurate Indoor Localization with CSI Selective Amplitude and Phase Based Regularized Dictionary Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Similarity of Binaries Across Optimization Levels and Obfuscation.
Proceedings of the Computer Security - ESORICS 2020, 2020

CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Independent metric learning with aligned multi-part features for video-based person re-identification.
Multim. Tools Appl., 2019

Deep feature representation and multiple metric ensembles for person re-identification in security surveillance system.
Multim. Tools Appl., 2019

Local region partition for person re-identification.
Multim. Tools Appl., 2019

Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019

Optimizing Multi-Granularity Region Similarity for Person Re-Identification.
IEEE Access, 2019

Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Android Malware Family Classification Based on Sensitive Opcode Sequence.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Tactics for Proving Separation Logic Assertion in Coq Proof Assistant.
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019

Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

A Behavior-Based Method for Distinguishing the Type of C&C Channel.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A New Hybrid Approach for C&C Channel Detection.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Deep-BIF: Blind Image Forensics Based on Deep Learning.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking.
IEEE Trans. Multim., 2018

Video-Based Person Re-Identification With Accumulative Motion Context.
IEEE Trans. Circuits Syst. Video Technol., 2018

A reliable speed controller for suppressing low frequency concussion of electric vehicle.
Microelectron. Reliab., 2018

Sequence-based Person Attribute Recognition with Joint CTC-Attention Model.
CoRR, 2018

A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios.
Proceedings of the 17th IEEE International Conference On Trust, 2018

BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Feature Fusion and Ellipse Segmentation for Person Re-identification.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Video-Based Person Re-identification with Adaptive Multi-part Features Learning.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Re-Ranking Person Re-Identification with Forward and Reverse Sorting Constraints.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Comprehensive Behavior Profiling Model for Malware Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Research on Role Mining Algorithms in RBAC.
Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference, 2018

A Passive-Measurement-Guided Tree Network Surveying and Mapping Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems.
IEEE Trans. Reliab., 2017

Visual Classification of Furniture Styles.
ACM Trans. Intell. Syst. Technol., 2017

End-to-End Comparative Attention Networks for Person Re-Identification.
IEEE Trans. Image Process., 2017

Unsupervised t-Distributed Video Hashing and Its Deep Hashing Extension.
IEEE Trans. Image Process., 2017

Window switching strategy based semi-fragile watermarking for MP3 tamper detection.
Multim. Tools Appl., 2017

Segmentation method for medical image based on improved GrabCut.
Int. J. Imaging Syst. Technol., 2017

Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

Design of T-type three-level energy storage inverter and grid-connected control strategy.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Fast finite control set model predictive control for three-phase five-level nested neutral point piloted converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Neural Person Search Machines.
Proceedings of the IEEE International Conference on Computer Vision, 2017

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Spatially guided local Laplacian filter for nature image detail enhancement.
Multim. Tools Appl., 2016

基于低秩稀疏分解与协作表示的图像分类算法 (Image Classification Algorithm Based on Low Rank and Sparse Decomposition and Collaborative Representation).
计算机科学, 2016

Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games.
J. Comput. Sci. Technol., 2016

Visual summarization of image collections by fast RANSAC.
Neurocomputing, 2016

Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Person Re-identification by Multiple Feature Representations and Metric Learning.
Proceedings of the Intelligent Visual Surveillance - 4th Chinese Conference, 2016

Event Detection with Convolutional Neural Networks for Forensic Investigation.
Proceedings of the Intelligent Information Processing VIII, 2016

Towards Discovering Covert Communication Through Email Spam.
Proceedings of the Intelligent Information Processing VIII, 2016

2015
Kernelized Relaxed Margin Components Analysis for Person Re-identification.
IEEE Signal Process. Lett., 2015

Image classification based on low-rank matrix recovery and Naive Bayes collaborative representation.
Neurocomputing, 2015

Using binary particle swarm optimization to search for maximal successful coalition.
Appl. Intell., 2015

A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
PicWords: Render a Picture by Packing Keywords.
IEEE Trans. Multim., 2014

Research on the Multilevel STATCOM based on the H-bridge Cascaded.
J. Networks, 2014

Person Re-identification based on nonlinear ranking with difference vectors.
Inf. Sci., 2014

Automatic image annotation by semi-supervised manifold kernel density estimation.
Inf. Sci., 2014

Directional projection based image fusion quality metric.
Inf. Sci., 2014

On improving behavior subtraction.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Non-linear metric learning with multiple features for person re-identification.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Robust Anatomical Correspondence Detection by Hierarchical Sparse Graph Matching.
IEEE Trans. Medical Imaging, 2013

<i>ε</i>-<i>Isometry</i>ε-Isometry based shape approximation for image content representation.
Signal Process., 2013

A Monte Carlo Enhanced PSO Algorithm for Optimal QoM in Multi-Channel Wireless Networks.
J. Comput. Sci. Technol., 2013

Intervention Learning of Local Causal Structure Based on Sensitivity Analysis.
J. Comput., 2013

Advertising object in web videos.
Neurocomputing, 2013

Active learning based intervertebral disk classification combining shape and texture similarities.
Neurocomputing, 2013

MR prostate segmentation via distributed discriminative dictionary (DDD) learning.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

Systematic modeling and control of indirect modular multilevel converter (MMC) with grid unbalance estimation.
Proceedings of the IECON 2013, 2013

Image matching by fast random sample consensus.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

2012
A review and prospect of readable machine proofs for geometry theorems.
J. Syst. Sci. Complex., 2012

Robust Anatomical Correspondence Detection by Graph Matching with Sparsity Constraint.
Proceedings of the Medical Computer Vision. Recognition Techniques and Applications in Medical Imaging, 2012

2011
Chaos-Based Video Encryption Algorithms.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Video accessibility enhancement for hearing-impaired users.
ACM Trans. Multim. Comput. Commun. Appl., 2011

A Novel Intelligent Technique for Recognition of Coke Optical Texture.
J. Softw., 2011

A transition rate transformation method for solving advection-dispersion equation.
J. Comput. Phys., 2011

Path selection in disaster response management based on Q-learning.
Int. J. Autom. Comput., 2011

A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions.
Appl. Soft Comput., 2011

Intervertebral Disc Shape Analysis with Geodesic Metric in Shape Space.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Distribution-Based Active Contour Model for Medical Image Segmentation.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling.
J. Multim., 2010

Searching for overlapping coalitions in multiple virtual organizations.
Inf. Sci., 2010

The SLDSRC Rate Control Scheme for H.264.
Proceedings of the Advances in Multimedia Modeling, 2010

2009
Video Security Algorithm Aiming at the Need of Privacy Protection.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Joint Scheme for Delay-Limited Video Transmission over Energy-Constrained MANET.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
A Novel Strategy of Coalition Evolvement Based on Interest.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Greedy Algorithm Solution to Agent Coalition for Single Task.
Proceedings of the Third International Conference on Natural Computation, 2007

A WSN Coalition Formation Algorithm Based on Ant Colony with Dual-Negative Feedback.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Comprehensive Evaluation of Agent Coalition Based on D-S Evidential Reasoning.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Particle Swarms Cooperative Optimization for Coalition Generation Problem.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

2004
Solution to Agent Coalition Problem using Improved Ant Colony Optimization Algorithm.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2001
Two quadrants control of the switched reluctance motor drive for application in electric drive bicycle.
Proceedings of the IEEE International Conference on Systems, 2001


  Loading...