Lei Jin

Orcid: 0000-0003-4855-2464

Affiliations:
  • University of Pittsburgh, School of Information Sciences, PA, USA
  • Tsinghua University, Beijing, China (former)


According to our database1, Lei Jin authored at least 57 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SkatingVerse: A large-scale benchmark for comprehensive evaluation on human action understanding.
IET Comput. Vis., October, 2024

Review and Analysis of RGBT Single Object Tracking Methods: A Fusion Perspective.
ACM Trans. Multim. Comput. Commun. Appl., August, 2024

Rethinking the Person Localization for Single-Stage Multi-Person Pose Estimation.
IEEE Trans. Multim., 2024

UniParser: Multi-Human Parsing With Unified Correlation Representation Learning.
IEEE Trans. Image Process., 2024

DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal From Optical Satellite Images.
IEEE Trans. Geosci. Remote. Sens., 2024

Autonomous Driving in Unstructured Environments: How Far Have We Come?
CoRR, 2024

The SkatingVerse Workshop & Challenge: Methods and Results.
CoRR, 2024

GOP: A Group Object Perception Framework for Optical Remote Sensing.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Unified Single-Stage Transformer Network for Efficient RGB-T Tracking.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

ASQuery: A Query-based Model for Action Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

DriveWorld: 4D Pre-Trained Scene Understanding via World Models for Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

SynSP: Synergy of Smoothness and Precision in Pose Sequences Refinement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Pruning-and-distillation: One-stage joint compression framework for CNNs <i>via</i> clustering.
Image Vis. Comput., August, 2023

CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset.
Inf., February, 2023

Grouping by Center: Predicting Centripetal Offsets for the Bottom-up Human Pose Estimation.
IEEE Trans. Multim., 2023

Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023

UniParser: Multi-Human Parsing with Unified Correlation Representation Learning.
CoRR, 2023

Unified Single-Stage Transformer Network for Efficient RGB-T Tracking.
CoRR, 2023

DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal from Optical Satellite Images.
CoRR, 2023

Evidential Detection and Tracking Collaboration: New Problem, Benchmark and Algorithm for Robust Anti-UAV System.
CoRR, 2023

The 3rd Anti-UAV Workshop & Challenge: Methods and Results.
CoRR, 2023

Single-stage Multi-human Parsing via Point Sets and Center-based Offsets.
CoRR, 2023

DecenterNet: Bottom-Up Human Pose Estimation Via Decentralized Pose Representation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Single-Stage Multi-human Parsing via Point Sets and Center-based Offsets.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Modality Meets Long-Term Tracker: A Siamese Dual Fusion Framework for Tracking UAV.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
AdaptivePose++: A Powerful Single-Stage Network for Multi-Person Pose Regression.
CoRR, 2022

QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Single-Stage is Enough: Multi-Person Absolute 3D Pose Estimation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

between flow and bytes.
Proceedings of the Eighth IEEE International Conference on Big Data Computing Service and Applications, 2022

2021
Network Intrusion Detection Based on an Efficient Neural Architecture Search.
Symmetry, 2021

A Commodity Classification Framework Based on Machine Learning for Analysis of Trade Declaration.
Symmetry, 2021

HARNAS: Human Activity Recognition Based on Automatic Neural Architecture Search Using Evolutionary Algorithms.
Sensors, 2021

DRNet: A Depth-Based Regression Network for 6D Object Pose Estimation.
Sensors, 2021

Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.
Sensors, 2021

Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection.
Secur. Commun. Networks, 2021

The 2nd Anti-UAV Workshop & Challenge: Methods and Results.
CoRR, 2021

Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification.
IEEE Access, 2021

Interpretability Framework of Network Security Traffic Classification Based on Machine Learning.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
A Hybrid Network Based on Dense Connection and Weighted Feature Aggregation for Human Activity Recognition.
IEEE Access, 2020

2019
VisDrone-DET2019: The Vision Meets Drone Object Detection in Image Challenge Results.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

2018
<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018

2016
Towards understanding the gamification upon users' scores in a location-based social network.
Multim. Tools Appl., 2016

Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst., 2016

2015
Towards complexity analysis of User Authorization Query problem in RBAC.
Comput. Secur., 2015

2014
On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Venue attacks in location-based social networks.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014

POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Mutual-friend based attacks in social network systems.
Comput. Secur., 2013

Towards understanding traveler behavior in Location-based Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Understanding venue popularity in Foursquare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Exploring trajectory-driven local geographic topics in foursquare.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Towards understanding residential privacy by analyzing users' activities in foursquare.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2011
Analysing security and privacy issues of using e-mail address as identity.
Int. J. Inf. Priv. Secur. Integr., 2011

Towards active detection of identity clone attacks on online social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Security and Privacy Risks of Using E-mail Address as an Identity.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010


  Loading...