Jun Dai

Orcid: 0000-0002-6890-6429

According to our database1, Jun Dai authored at least 87 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint Optimization of Vehicular Sensing and Vehicle Digital Twins Deployment for DT-Assisted IoVs.
IEEE Trans. Veh. Technol., August, 2024

Novel Potential Guided Bidirectional RRT<sup>*</sup> With Direct Connection Strategy for Path Planning of Redundant Robot Manipulators in Joint Space.
IEEE Trans. Ind. Electron., March, 2024

Research and Design of Intelligent Parking Management System based on the YOLO Algorithm.
Scalable Comput. Pract. Exp., 2024

Benchmarking of quantum fidelity kernels for Gaussian process regression.
Mach. Learn. Sci. Technol., 2024

GFlowNets for Hamiltonian decomposition in groups of compatible operators.
CoRR, 2024

Enabling Practical and Privacy-Preserving Image Processing.
CoRR, 2024

HuntFUZZ: Enhancing Error Handling Testing through Clustering Based Fuzzing.
CoRR, 2024

SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing.
CoRR, 2024

Multi-hop relay selection for underwater acoustic sensor networks: A dynamic combinatorial multi-armed bandit learning approach.
Comput. Networks, 2024

Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Demonstration of Hitless OCS Provision for Multi-modal Traffic in a Centralized Scheduling Hybrid Optical/Electrical Datacenter Network.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2024

2023
Artifact Detection and Restoration in Histology Images With Stain-Style and Structural Preservation.
IEEE Trans. Medical Imaging, December, 2023

Neural network Gaussian processes as efficient models of potential energy surfaces for polyatomic molecules.
Mach. Learn. Sci. Technol., December, 2023

Audit 4.0-based ESG assurance: An example of using satellite images on GHG emissions.
Int. J. Account. Inf. Syst., September, 2023

Research on task assignment algorithm of heterogeneous aircraft cooperative cluster in dynamic scene.
Comput. Electr. Eng., September, 2023

Ethical impact of artificial intelligence in managerial accounting.
Int. J. Account. Inf. Syst., June, 2023

Categorical Feature GAN for Imbalanced Intelligent Fault Diagnosis of Rotating Machinery.
IEEE Trans. Instrum. Meas., 2023

Research on Kinematic and Static Filtering of the ESKF Based on INS/GNSS/UWB.
Sensors, 2023

Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel Caching.
Proc. ACM Manag. Data, 2023

Validation of a Secure Programming Concept Inventory.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Identifying Superspreaders by Ranking System Object Instance Graphs.
Proceedings of the Advances in Digital Forensics XIX, 2023

Early Rumor Detection in Social Media Based on Graph Convolutional Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Using Blockchain for Decentralized Artificial Intelligence with Data Privacy.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Numerical Investigation of Si Nanowires Integrated Perovskite for Efficient Tandem Solar Cell.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Dynamic Balanced Domain-Adversarial Networks for Cross-Domain Fault Diagnosis of Train Bearings.
IEEE Trans. Instrum. Meas., 2022

Mobile Robot Localization and Mapping Algorithm Based on the Fusion of Image and Laser Point Cloud.
Sensors, 2022

UAV Localization Algorithm Based on Factor Graph Optimization in Complex Scenes.
Sensors, 2022

Research on UAV Robust Adaptive Positioning Algorithm Based on IMU/GNSS/VO in Complex Scenes.
Sensors, 2022

Autonomous Navigation of Robots Based on the Improved Informed-RRT ∗ Algorithm and DWA.
J. Robotics, 2022

Real-time road object segmentation using improved light-weight convolutional neural network based on 3D LiDAR point cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Cluster head selection method of multiple UAVs under COVID-19 situation.
Comput. Commun., 2022

Prediction of Lung Infection during Palliative Chemotherapy of Lung Cancer Based on Artificial Neural Network.
Comput. Math. Methods Medicine, 2022

Research on Seismic Acceleration Waveform Reproduction Based on Time-Frequency Hybrid Integration Algorithm.
IEEE Access, 2022

Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

SecTutor: An Intelligent Tutoring System for Secure Programming.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

Research on NARX wind speed prediction network based on Copula.
Proceedings of the 27th International Conference on Automation and Computing, 2022

Wind power ramp detection algorithms based on slope point correction.
Proceedings of the 27th International Conference on Automation and Computing, 2022

2021
A Planimetric Location Method for Laser Footprints of the Chinese Gaofen-7 Satellite Using Laser Spot Center Detection and Image Matching to Stereo Image Product.
IEEE Trans. Geosci. Remote. Sens., 2021

PRISM: recovering cell-type-specific expression profiles from individual composite RNA-seq samples.
Bioinform., 2021

Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

Measuring Self-efficacy in Secure Programming.
Proceedings of the Information Security Education for Cyber Resilience, 2021

Optimal Path Planning of Lawn Mower Based on Trajectory Tracking Control in Civil Aviation Airport.
Proceedings of the ICISCAE 2021: 4th International Conference on Information Systems and Computer Aided Education, Dalian, China, September 24, 2021

2020
A Novel Pricing Mechanism for User Coalition in Blockchain.
Wirel. Commun. Mob. Comput., 2020

Design and Data Processing of China's First Spaceborne Laser Altimeter System for Earth Observation: GaoFen-7.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

Facial Expression Recognition Video Analysis System based on Facial Action Units : A Feasible Engineering Implementation Scheme.
Proceedings of the 13th International Symposium on Computational Intelligence and Design, 2020

Convergence Estimation of Ergodic Capacity for Vehicle-Mounted APs: Large Deviation Theory.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

Development of Human Capital in Indian Information Industry.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Using High-Frequency Local Field Potentials From Multicortex to Decode Reaching and Grasping Movements in Monkey.
IEEE Trans. Cogn. Dev. Syst., 2019

Enforcing Secure Coding Rules for the C Programming Language Using the Eclipse Development Environment.
Proceedings of the National Cyber Summit, 2019

2018
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
IEEE Trans. Inf. Forensics Secur., 2018

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018

An improved A* algorithm for the industrial robot path planning with high success rate and short length.
Robotics Auton. Syst., 2018

Sustainable supply chain management practices and performance.
Ind. Manag. Data Syst., 2018

An early detection tool in Eclipse to support secure coding practices.
Int. J. Inf. Priv. Secur. Integr., 2018

Understanding usage and value of audit analytics for internal auditors: An organizational approach.
Int. J. Account. Inf. Syst., 2018

A Modified Sine-Cosine Algorithm Based on Neighborhood Search and Greedy Levy Mutation.
Comput. Intell. Neurosci., 2018

A Mobile Botnet That Meets Up at Twitter.
Proceedings of the Security and Privacy in Communication Networks, 2018

Combining Design by Contract and Inference Rules of Programming Logic towards Software Reliability.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Don't Be Surprised: I See Your Mobile App Stealing Your Data.
Proceedings of the 2018 International Conference on Computing, 2018

Concept Inventories in Cybersecurity Education: An Example from Secure Programming.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Situation Awareness-Oriented Cybersecurity Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Enterprise-Level Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Toward Blockchain-Based Accounting and Assurance.
J. Inf. Syst., 2017

Evaluating Secure Programming Knowledge.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2016
HAVA: Heterogeneous Multicore ASIP for Multichannel Low-Bit-Rate Vocoder Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Towards probabilistic identification of zero-day attack paths.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Effect of aluminum concentration on the microstructure and mechanical properties of Sn-Cu-Al solder alloy.
Microelectron. Reliab., 2015

Matching-Pursuit-Based Spatial-Trace Time-Frequency Peak Filtering for Seismic Random Noise Attenuation.
IEEE Geosci. Remote. Sens. Lett., 2015

XQuery Data Mining Tool for Campus Security.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
An efficient quantum anonymous communication with hybrid entanglement swapping.
Int. J. Internet Protoc. Technol., 2014

Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Implementation of Lushan Virtual Digital Plant Museum.
Trans. Edutainment, 2013

Path-generating regulator along a straight passage for two-wheeled mobile robots.
Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2013

Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Proceedings of the Computer Security - ESORICS 2013, 2013

SKRM: Where security techniques talk to each other.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

2012
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Registered Localization Method-based on OpenCV for Augmented Reality.
Proceedings of the Third International Conference of Soft Computing and Pattern Recognition, 2011

Prognostics-based health management for telecom equipment under free air cooling.
Proceedings of EUROCON 2011, 2011

2010
The lake water bloom intelligent prediction method and water quality remote monitoring system.
Proceedings of the Sixth International Conference on Natural Computation, 2010

A VaR Algorithm for Warrants Portfolio.
Proceedings of the Algorithmic Aspects in Information and Management, 2010

2009
Performance analysis of inter-vehicle communications in multilane traffic streams.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Saving the calculating time of the TCNN with nonchaotic simulated annealing strategy.
Proceedings of the IEEE International Conference on Systems, 2009

VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Water-Bloom Medium-Term Prediction Based on Gray-BP Neural Network Method.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Research on One Intelligent Prediction Method for Water Bloom.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2002
Retargetable cross compilation techniques: comparison and analysis of GCC and Zephyr.
ACM SIGPLAN Notices, 2002

1994
Automated theorem proving in temporal logic: T-resolution.
J. Comput. Sci. Technol., 1994


  Loading...