Lei Jin
Orcid: 0000-0003-4855-2464Affiliations:
- University of Pittsburgh, School of Information Sciences, PA, USA
- Tsinghua University, Beijing, China (former)
According to our database1,
Lei Jin
authored at least 57 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SkatingVerse: A large-scale benchmark for comprehensive evaluation on human action understanding.
IET Comput. Vis., October, 2024
ACM Trans. Multim. Comput. Commun. Appl., August, 2024
IEEE Trans. Multim., 2024
IEEE Trans. Image Process., 2024
DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal From Optical Satellite Images.
IEEE Trans. Geosci. Remote. Sens., 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
DriveWorld: 4D Pre-Trained Scene Understanding via World Models for Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Pruning-and-distillation: One-stage joint compression framework for CNNs <i>via</i> clustering.
Image Vis. Comput., August, 2023
CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset.
Inf., February, 2023
Grouping by Center: Predicting Centripetal Offsets for the Bottom-up Human Pose Estimation.
IEEE Trans. Multim., 2023
Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023
CoRR, 2023
DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal from Optical Satellite Images.
CoRR, 2023
Evidential Detection and Tracking Collaboration: New Problem, Benchmark and Algorithm for Robust Anti-UAV System.
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
2022
CoRR, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Eighth IEEE International Conference on Big Data Computing Service and Applications, 2022
2021
Symmetry, 2021
A Commodity Classification Framework Based on Machine Learning for Analysis of Trade Declaration.
Symmetry, 2021
HARNAS: Human Activity Recognition Based on Automatic Neural Architecture Search Using Evolutionary Algorithms.
Sensors, 2021
Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.
Sensors, 2021
Secur. Commun. Networks, 2021
Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification.
IEEE Access, 2021
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
2020
A Hybrid Network Based on Dense Connection and Weighted Feature Aggregation for Human Activity Recognition.
IEEE Access, 2020
2019
VisDrone-DET2019: The Vision Meets Drone Object Detection in Image Challenge Results.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
2018
<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018
2016
Towards understanding the gamification upon users' scores in a location-based social network.
Multim. Tools Appl., 2016
Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst., 2016
2015
Comput. Secur., 2015
2014
Inf. Process. Lett., 2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2012
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Towards understanding residential privacy by analyzing users' activities in foursquare.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012
2011
Int. J. Inf. Priv. Secur. Integr., 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010