Quanliang Jing

Orcid: 0000-0002-7670-7729

According to our database1, Quanliang Jing authored at least 13 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks.
IEEE Trans. Consumer Electron., February, 2024

STBench: Assessing the Ability of Large Language Models in Spatio-Temporal Analysis.
CoRR, 2024

CausalTAD: Causal Implicit Generative Model for Debiased Online Trajectory Anomaly Detection.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

2023
TAEffect: Quantifying interaction risks in trust-enabled communication systems.
Int. J. Commun. Syst., 2023

2022
GTAT: Adversarial Training with Generated Triplets.
Proceedings of the International Joint Conference on Neural Networks, 2022

Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Decentralized Trust Management: Risk Analysis and Trust Aggregation.
ACM Comput. Surv., 2021

Meta-Learning Enhanced Neural ODE for Citywide Next POI Recommendation.
Proceedings of the 22nd IEEE International Conference on Mobile Data Management, 2021

AdvCGAN: An Elastic and Covert Adversarial Examples Generating Framework.
Proceedings of the International Joint Conference on Neural Networks, 2021

TRANSFAKE: Multi-task Transformer for Multimodal Enhanced Fake News Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

TrajCross: Trajecotry Cross-Modal Retrieval with Contrastive Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2018
SERL: Semantic-Path Biased Representation Learning of Heterogeneous Information Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018

2014
On the Prevention of Invalid Route Injection Attack.
Proceedings of the Intelligent Information Processing VII, 2014


  Loading...