Junfeng Xu

Orcid: 0000-0002-0220-5654

According to our database1, Junfeng Xu authored at least 63 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Matching Spring Phenology Indicators in Ground Observations and Remote-Sensing Metrics.
Remote. Sens., July, 2024

Joint Audio-Visual Attention with Contrastive Learning for More General Deepfake Detection.
ACM Trans. Multim. Comput. Commun. Appl., May, 2024

IPNet: Polarization-based Camouflaged Object Detection via dual-flow network.
Eng. Appl. Artif. Intell., January, 2024

CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients.
J. King Saud Univ. Comput. Inf. Sci., 2024

A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems.
IEEE Internet Things J., 2024

Multi-scale Feature Learning with Graph Attention Network for Face Forgery Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024

Assessment of Landslide Susceptibility Considering the Factors of Human Engineering Activities.
Proceedings of the IGARSS 2024, 2024

Urban Surface Water Extraction Based on Sentinel 2 Images.
Proceedings of the IGARSS 2024, 2024

2023
APT Encrypted Traffic Detection Method based on Two-Parties and Multi-Session for IoT.
CoRR, 2023

Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

An Approach for Constructing Multi-Modal Spatio-Temporal Ontology of Ship Communication.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

Three-Dimensional Aerosol Structure Construction with Regional Spectral Radiation Matching.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Self-Supervised Adversarial Training for Robust Face Forgery Detection.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
Anchor-Free Arbitrary-Oriented Object Detector Using Box Boundary-Aware Vectors.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

2021
Generalized Centered 2-D Principal Component Analysis.
IEEE Trans. Cybern., 2021

Crowd aware summarization of surveillance videos by deep reinforcement learning.
Multim. Tools Appl., 2021

2020
Saliency based multiple object cosegmentation by ensemble MIML learning.
Multim. Tools Appl., 2020

2019
Exploring Model Transfer Potential for Airborne LiDAR Point Cloud Classification.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019

Haralick Feature Guided Network for the Improvement of Generalization in Landcover Classification.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019

2018
A Methodological Framework to Retrospectively Obtain Downscaled Precipitation Estimates over the Tibetan Plateau.
Remote. Sens., 2018

A dynamic online protection framework for Android applications.
Comput. Syst. Sci. Eng., 2018

Immunohistochemical quantification of expression of a tight junction protein, claudin-7, in human lung cancer samples using digital image analysis method.
Comput. Methods Programs Biomed., 2018

Hierarchical Building Extraction from High-resolution Remote Sensing Imagery Based on Multi-feature and Multi-scale Method.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018

How Much Would Different Temporal Scales Affect the Pattern of Rice Exposure to Heat Stress in China?
Proceedings of the 2018 7th International Conference on Agro-geoinformatics (Agro-geoinformatics), 2018

Research on the Relationship Between the Spatial and Temporal Variation of Greenup and Precipitation in Mongolian Plateau.
Proceedings of the 2018 7th International Conference on Agro-geoinformatics (Agro-geoinformatics), 2018

2017
Review on the Traction System Sensor Technology of a Rail Transit Train.
Sensors, 2017

Attacks and countermeasures in the internet of vehicles.
Ann. des Télécommunications, 2017

Co-saliency Detection via Sparse Reconstruction and Co-salient Object Discovery.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

2016
An Effective Android Software Reinforcement Scheme Based on Online Key.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Road Extraction Based on Direction Consistency Segmentation.
Proceedings of the Pattern Recognition - 7th Chinese Conference, 2016

2015
Security and Privacy in the Internet of Vehicles.
Proceedings of the International Conference on Identification, 2015

Recommendable Schemes of Anti-decompilation for Android Applications.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Toward a Secure Android Software Protection System.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Comparison of HY-2 and QuikSCAT Vector Wind Products for Tropical Cyclone Track and Intensity Development Monitoring.
IEEE Geosci. Remote. Sens. Lett., 2014

ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Design and measurement of substrate-integrated planar millimeter wave antenna arrays at 60-325 GHz.
Proceedings of the 2014 IEEE Radio and Wireless Symposium, 2014

Security Analysis and Protection Based on Smali Injection for Android Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Asymmetric multi-path division communications in underwater acoustic networks with fading channels.
J. Comput. Syst. Sci., 2013

Pairing and Authentication Security Technologies in Low-Power Bluetooth.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Energy-Efficient Tree-Based Multipath Power Control for Underwater Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

On Forward Error Correction with Hamming Code for multi-path communications.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

The survey of cache management in the shared storage environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

RCSA-P: A remote control system architecture with high scalability.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Cooperative Work Systems for the security of digital computing infrastructure Cooperative detection systems for Botnet detection.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Research on security evaluation of cloud computing based on attack graph.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Multi-path Division Transmission for Improving Reliability and Energy Effciency in Underwater Acoustic Networks.
Proceedings of the International Conference on Computational Science, 2011

Layered video multicast with a P2P cooperation approach.
J. Netw. Comput. Appl., 2011

Uniqueness of meromorphic functions sharing a small function and its applications.
Comput. Math. Appl., 2011

Improvement of Teaching Mode and Its Effect on Experiments in Material Mechanics with Information Technology.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
An energy efficient packet aggregation scheme for wireless sensor networks.
Comput. Syst. Sci. Eng., 2010

Fixed-points and uniqueness of meromorphic functions.
Comput. Math. Appl., 2010

Layered Multi-Path Power Control in Underwater Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
SIW-Like Guided Wave Structures and Applications.
IEICE Trans. Electron., 2009

Some further results on weighted sharing three values and Brosch's theorem.
Comput. Math. Appl., 2009

Solutions of higher order linear differential equations in an angle.
Appl. Math. Lett., 2009

Adaptive Energy-Efficient Packet Transmission for Voice Delivering in Wireless Sensor Networks.
Proceedings of the NPC 2009, 2009

2008
Oilseed Rape Planting Area Extraction by Support Vector Machine Using Landsat TM Data.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Study on Relationship Between NIHSS and TCM-SSASD Based on the BP Neural Network Multiple Models Method.
Proceedings of the Advances in Neural Networks, 2007

2005
A 17-mW 0.66-mm<sup>2</sup> direct-conversion receiver for 1-Mb/s cable replacement.
IEEE J. Solid State Circuits, 2005

Atmospheric correction of IKONOS imagery for quantitative retrieval of biophysical parameters.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
A multiply-by-3 coupled-ring oscillator for low-power frequency synthesis.
IEEE J. Solid State Circuits, 2004


  Loading...