Jin Tian

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System.
IEEE Trans. Netw. Serv. Manag., October, 2024

An Embedded Electromyogram Signal Acquisition Device.
Sensors, July, 2024

A multi-stage quantitative resilience analysis and optimization framework considering dynamic decisions for urban infrastructure systems.
Reliab. Eng. Syst. Saf., March, 2024

MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024

PoeticAR: Reviving Traditional Poetry of the Heritage Site of Jichang Garden via Augmented Reality.
Int. J. Hum. Comput. Interact., March, 2024

AnnotatedTables: A Large Tabular Dataset with Language Model Annotations.
CoRR, 2024

Probabilities of Causation for Continuous and Vector Variables.
CoRR, 2024

Improving Adversarial Training using Vulnerability-Aware Perturbation Budget.
CoRR, 2024

Identification and Estimation of Conditional Average Partial Causal Effects via Instrumental Variable.
CoRR, 2024

SLChain: A secure and low-storage pressure sharding blockchain.
Concurr. Comput. Pract. Exp., 2024

PartChain: Scaling blockchain through account-based partitioned sharding.
Comput. Networks, 2024

StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT.
Comput. Networks, 2024

A Novel Moving Ship Target Refocusing Algorithm by HFSWR Information Assisted SAR-GMTI System.
Proceedings of the IGARSS 2024, 2024

Weak and Small Group Target Tracking Method Based on Multi-Dimensional Screening of Point Traces.
Proceedings of the IGARSS 2024, 2024

Estimating Causal Effects from Learned Causal Networks.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

2023
DCCP: a dependable committee consensus protocol for permissionless blockchain.
J. Supercomput., March, 2023

TSBFT: A scalable and efficient leaderless byzantine consensus for consortium blockchain.
Comput. Networks, February, 2023

Vulnerability-Aware Instance Reweighting For Adversarial Training.
Trans. Mach. Learn. Res., 2023

Variable Rate Point Cloud Geometry Compression Method.
Sensors, 2023

Neural Interpretation of Generic Source Code.
CoRR, 2023

Deep Reinforcement Learning Based Resource Allocation with Heterogeneous QoS for Cellular V2X.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

CuckChain: A Cuckoo Rule Based Secure, High Incentive and Low Latency Blockchain System via Sharding.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Instrumental Variable Estimation of Average Partial Causal Effects.
Proceedings of the International Conference on Machine Learning, 2023

A Penalized Modified Huber Regularization to Improve Adversarial Robustness.
Proceedings of the IEEE International Conference on Image Processing, 2023

Expert Recommendation Method for Fault Maintenance Based On Industrial Manufacturing Knowledge.
Proceedings of the IEEE International Conference on Data Mining, 2023

Improving Adversarial Robustness with Hypersphere Embedding and Angular-Based Regularizations.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
A Real-Time Complex Road AI Perception Based on 5G-V2X for Smart City Security.
Wirel. Commun. Mob. Comput., 2022

True2 Orthoimage Map Generation.
Remote. Sens., 2022

Neuron Dependency Graphs: A Causal Abstraction of Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

2021
A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification.
Wirel. Commun. Mob. Comput., 2021

AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images.
Remote. Sens., 2021

Mutual Information Approximation Based Polar Code Design for 4Tb/in<sup>2</sup> 2D-ISI Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Beyond Discriminant Patterns: On the Robustness of Decision Rule Ensembles.
CoRR, 2021

A Mutual Information Regularization for Adversarial Training.
Proceedings of the Asian Conference on Machine Learning, 2021

2020
Efficient Quantum Simulation of an Anti-P-Pseudo-Hermitian Two-Level System.
Entropy, 2020

Spatial Resolution Enhancement of Remote Sensing Hyperspectral Images With Localized Spatial-Spectral Dictionary Pair.
IEEE Access, 2020

Ultrasound Image Segmentation Method for Thyroid Nodules Using ASPP Fusion Features.
IEEE Access, 2020

2019
Local Sparse Representation Based Spatial Preprocessing For Endmember Extraction.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Spatial Constrained Hyperspectral Reconstruction from RGB Inputs Using Dictionary Representation.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
Hyperspectral and Multispectral Image Fusion with Dual-Source Spatial-Spectral Dictionary.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

2016
Concurrent optimisation method for three-dimensional power delivery network design.
IET Circuits Devices Syst., 2016

2013
Modeling and analysis of signal transmission with Through Silicon Via (TSV) noise coupling.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2011
A New Threshold Setting Method of GNSS Signal Acquisition under Near-Far Situation.
IEICE Trans. Commun., 2011

2010
Key issues of cognitive radio.
Multiagent Grid Syst., 2010

2009
Non Spectrum Handover Link Maintenance Performance in Cognitive Radio.
Proceedings of the IEEE International Conference on Systems, 2009

Research on Algorithm of Digital Filtering Based on Video Information Security.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Single DSP Hardware Design in Real-Time Multi-constellation Satellite Navigation Receiver.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A QoS MAC Protocol for Cognitive PMP Networks with Rapid Changes of Spectrum Opportunities.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

2005
A New Access Network Architecture for the Next Generation Wireless Networks.
Proceedings of the Self-Organization and Autonomic Informatics (I), 2005


  Loading...