Jing Song

Orcid: 0000-0003-1475-5263

According to our database1, Jing Song authored at least 59 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Reinforcement Learning Based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication.
IEEE Trans. Mob. Comput., December, 2024

General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme.
Clust. Comput., August, 2024

Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels.
IEEE Trans. Inf. Forensics Secur., 2024

The integrated monitoring system for rail transit and the switching method for the main and backup control centers.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

2023
How Does a Digital Twin Network Work Well for Connected and Automated Vehicles: Joint Perception, Planning, and Control.
IEEE Veh. Technol. Mag., December, 2023

A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things.
J. Supercomput., November, 2023

Fast DOA Estimation Algorithms via Positive Incremental Modified Cholesky Decomposition for Augmented Coprime Array Sensors.
Sensors, November, 2023

Distributed Resource Optimization With Blockchain Security for Immersive Digital Twin in IIoT.
IEEE Trans. Ind. Informatics, May, 2023

Complete solution for vehicle Re-ID in surround-view camera system.
Int. J. Mach. Learn. Cybern., May, 2023

Energy Efficiency and Spectral Efficiency Tradeoff in Multi-BD Symbiotic Radio Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
Energy-Delay Tradeoff in Adaptive Cooperative Caching for Energy-Harvesting Ultradense Networks.
IEEE Trans. Comput. Soc. Syst., 2022

QoE-Driven Distributed Resource Optimization for Mixed Reality in Dynamic TDD Systems.
IEEE Trans. Commun., 2022

An enhanced matrix completion method based on non-negative latent factors for recommendation system.
Expert Syst. Appl., 2022

Affinity and foreign users' perception about Chinese mobile apps: An integrated view of affective contagion and value-based perspectives.
Electron. Commer. Res. Appl., 2022

A Secure Authentication Approach for the Smart Terminal and Edge Service.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

An Improved-PoA Consensus Algorithm for Blockchain-empowered Data Sharing System.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

2021
Hybrid Analog-Digital Precoder Design for Securing Cognitive Millimeter Wave Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Identification of genetic variations associated with drug resistance in non-small cell lung cancer patients undergoing systemic treatment.
Briefings Bioinform., 2021

Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Power Management Method for Clean Energy Ships Based on Supply Capacity Constraints.
Proceedings of the 2021 International Conference on Security, 2021

Disentangling and Vectorization: A 3D Visual Perception Approach for Autonomous Driving Based on Surround-View Fisheye Cameras.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

Adaptive Multi-Scale Semantic Fusion Network For Zero-Shot Learning.
Proceedings of the 2021 IEEE International Conference on Multimedia & Expo Workshops, 2021

Information Security Detection Technology for Industrial Control Equipment Modeling Generated by Excitation Traversal Test Based on Big Data.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Fault Analysis and Diagnosis Method for Intelligent Maintenance of OPGW Optical Cable in Power Systems.
Proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence, 2021

2020
Cooperative Caching and Transmission in CoMP-Integrated Cellular Networks Using Reinforcement Learning.
IEEE Trans. Veh. Technol., 2020

Exploratory Causal Analysis of Open Data: Explanation Generation and Confounder Identification.
J. Adv. Comput. Intell. Intell. Informatics, 2020

A MLEM-TV-MRP Algorithm for Fast Neutron Computed Tomography Reconstruction of High Statistical Noise and Sparse Sampling.
IEEE Access, 2020

Cost-Oriented Cooperative Caching Scheme in Energy-Harvesting-Powered Ultra-Dense Networks.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

Edge Intelligence-Based Joint Caching and Transmission for QoE-Aware Video Streaming.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Identification of Long Non-Coding RNA Signatures for Specific Disease-Free Prognosis in Clear Cell Renal Carcinoma.
IEEE Access, 2019

ISLF: Interest Shift and Latent Factors Combination Model for Session-based Recommendation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Responsibility Identification for Harmonic Instability in Grid-connected Inverter-Based Power System with Multi- Point of Common Coupling.
Proceedings of the IECON 2019, 2019

Distributed Active Damping for Harmonic Instability Suppression in the Multi-paralleled Grid-connected Inverter System.
Proceedings of the IECON 2019, 2019

Identification of Possible Common Causes by Intrinsic Dimension Estimation.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
A Framework for Crowd-Based Causal Analysis of Open Data.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

2017
Tell cause from effect: models and evaluation.
Int. J. Data Sci. Anal., 2017

Vehicle security encryption based on unlicensed encryption.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

2015
The Application of Grey-TOPSIS Method on Teaching Quality Evaluation of the Higher Education.
Int. J. Emerg. Technol. Learn., 2015

Assessment of Tweet Credibility with LDA Features.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

2013
A secure anonymous routing protocol in WSN.
Proceedings of the IEEE International Conference on Information and Automation, 2013

The state of the art of risk assessment and management for information systems.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Convexity Conditions for Parameterized Surfaces.
J. Softw., 2012

Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Multi-objective Optimization and Integration of Port Supply Chain Model.
Proceedings of the Modeling Risk Management for Resources and Environment in China, 2011

Water Quality Retrieval and Performance Analysis Using Landsat Thermatic Mapper Imagery Based on LS-SVM.
J. Softw., 2011

Changes in Electroencephalographic Power Spectra Associated with Reproductive Status in Frog.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

A nonlinear adaptive observer approach for state of charge estimation of lithium-ion batteries.
Proceedings of the American Control Conference, 2011

2010
A novel hypothesis-margin based approach for feature selection with side pairwise constraints.
Neurocomputing, 2010

Resource Allocation and Design of Variable Length Per-Tone Equalizers in MIMO-OFDM Systems.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Support Vector Regression and Ant Colony Optimization for Grid Resources Prediction.
Proceedings of the Advances in Neural Networks, 2010

2009
Eliminating small stopping sets in irregular low-density parity-check codes.
IEEE Commun. Lett., 2009

An Integration of Cloud Transform and Rough Set Theory to Induction of Decision Trees.
Fundam. Informaticae, 2009

FCM_FS: A Simultaneous Clustering and Feature Selection Model for Classification.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A New Decision Tree Construction Using the Cloud Transform and Rough Sets.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

2007
A rough sets based characteristic relation approach for dynamic attribute generalization in data mining.
Knowl. Based Syst., 2007

Portal-based Knowledge Environment for Collaborative Science.
Concurr. Comput. Pract. Exp., 2007

2005
Priority Refinement for Dependent Tasks in Large Embedded Real-Time Software.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

A Novel Illumination Normalization Method for Face Recognition.
Proceedings of the Advances in Biometric Person Authentication, 2005

1992
Adaptive Ho-Kashyap rules for perceptron training.
IEEE Trans. Neural Networks, 1992


  Loading...