Jing Long

Orcid: 0000-0002-5381-7925

According to our database1, Jing Long authored at least 49 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
J. Supercomput., May, 2024

On-Device Recommender Systems: A Comprehensive Survey.
CoRR, 2024

Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation.
Proceedings of the ACM on Web Conference 2024, 2024

Diffusion-Based Cloud-Edge-Device Collaborative Learning for Next POI Recommendations.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

2023
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance.
Connect. Sci., December, 2023

Intrusion Detection for In-Vehicle CAN Bus Based on Lightweight Neural Network.
J. Circuits Syst. Comput., May, 2023

RepSum: A general abstractive summarization framework with dynamic word embedding representation correction.
Comput. Speech Lang., May, 2023

Decentralized Collaborative Learning Framework for Next POI Recommendation.
ACM Trans. Inf. Syst., 2023

A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Examining how and when digital platform capabilities drive technological innovation: a strategic information perspective.
J. Enterp. Inf. Manag., 2023

Telematics Communication Based on Blockchain Technology.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

Model-Agnostic Decentralized Collaborative Learning for On-Device POI Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Incremental Multivariate State Estimation Technique-Based Fault Estimation Method for Motor-driven High-Voltage Circuit Breakers.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Intrusion Detection System for In-vehicle Networks with Incremental Learning Based on Cloud-Edge Collaborative Architecture.
Proceedings of the IEEE Smartworld, 2022

Thinking inside The Box: Learning Hypercube Representations for Group Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

2021
A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering.
ACM Trans. Multim. Comput. Commun. Appl., 2021

An empirical investigation of the utilitarian, social benefits in LBS information disclosure - The moderating effect of the gender based social role theory.
Int. J. Inf. Manag., 2021

Anonymous chaotic-based identity authentication protocol in IoT.
Int. J. Embed. Syst., 2021

Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021

A Survey of Machine Learning-based IoT Intrusion Detection Techniques.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

A Novel GNN Model for Fraud Detection in Online Trading Activities.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model.
IEEE Trans. Ind. Informatics, 2020

Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment.
IEEE Internet Things J., 2020

A robust error control coding-based watermarking algorithm for FPGA IP protection.
Int. J. Embed. Syst., 2020

Secure Digital Certificate-Based Data Access Control Scheme in Blockchain.
IEEE Access, 2020

2019
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments.
Inf. Sci., 2019

TBRS: A trust based recommendation scheme for vehicular CPS network.
Future Gener. Comput. Syst., 2019

Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference.
Future Gener. Comput. Syst., 2019

PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment.
IEEE Access, 2019

2018
A Security Situation Prediction Algorithm Based on HMM in Mobile Network.
Wirel. Commun. Mob. Comput., 2018

SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature.
Comput. Electr. Eng., 2018

A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Novel Identity Authentication for FPGA Based IP Designs.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
A new publicly verifiable blind detection scheme for intellectual property protection.
Int. J. Syst. Assur. Eng. Manag., 2017

2016
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2016

Study on PUF based secure protection for IC design.
Microprocess. Microsystems, 2016

A robust low-overhead watermarking for field authentication of intellectual property cores.
Comput. Sci. Inf. Syst., 2016

2015
Signature Restoration for Enhancing Robustness of FPGA IP Designs.
Int. J. Inf. Secur. Priv., 2015

Query-oriented unsupervised multi-document summarization via deep learning model.
Expert Syst. Appl., 2015

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Accelerate NDN name lookup using FPGA: Challenges and a scalable approach.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

2013
An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
A Study of Mandarin Segmental and Monosyllabic Intervals of CB and Early Speech.
Proceedings of the 17th International Congress of Phonetic Sciences, 2011

An FPGA-based distributed IP watermarking method.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...