Tingyao Jiang

Orcid: 0000-0002-8325-3657

According to our database1, Tingyao Jiang authored at least 26 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insulator Defect Detection Based on the CDDCR-YOLOv8 Algorithm.
Int. J. Comput. Intell. Syst., December, 2024

A deep learning-based method for deep information extraction from multimodal data for geological reports to support geological knowledge graph construction.
Earth Sci. Informatics, June, 2024

BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer.
IEEE Access, 2024

Online Trajectory Optimization and Resource Allocation in UAV-Assisted NOMA-MEC Systems.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
Aspect-Based Sentiment Analysis with Dependency Relation Weighted Graph Attention.
Inf., 2023

MSGAT-Based Sentiment Analysis for E-Commerce.
Inf., 2023

Incentive-driven and SAC-based Resource Allocation and Offloading Strategy in Vehicular Edge Computing Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
A Hybrid Recommendation Model for Online Learning.
Int. J. Robotics Autom., 2022

2020
Automatic Image Thresholding Based on Shannon Entropy Difference and Dynamic Synergic Entropy.
IEEE Access, 2020

2017
Maximum data delivery probability-oriented routing protocol in opportunistic mobile networks.
Peer-to-Peer Netw. Appl., 2017

复杂网络中节点暂态中心性预测研究 (Research on Temporal Centrality Prediction of Nodes in Complex Networks).
计算机科学, 2017

2016
An Application of SVM-Based Classification in Landslide Stability.
Intell. Autom. Soft Comput., 2016

2014
Sensitivity Analysis of Transport Machinery Configuration in Underground Cavern Group Construction.
Intell. Autom. Soft Comput., 2014

Maximum similarity thresholding.
Digit. Signal Process., 2014

Median-based thresholding, minimum error thresholding, and their relationships with histogram-based image similarity.
Proceedings of the Sixth International Conference on Digital Image Processing, 2014

2013
An Energy-Heterogeneous Clustering Scheme to Avoid Energy Holes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
An Improved Localization Algorithm of Nodes in Wireless Sensor Network.
J. Networks, 2012

2011
A Special Issue of Intelligent Automation and Soft Computing - Applications of Dependable Computing.
Intell. Autom. Soft Comput., 2011

A Novel Security Mechanism for Hybrid Encryption in Mineral Management Information System.
Intell. Autom. Soft Comput., 2011

A Special Issue of Intelligent Automation and Soft Computing - Theoretical Investigation Of Dependable Computing.
Intell. Autom. Soft Comput., 2011

An Improved Integrated Tender Evaluation Method Based On Analytic Hierarchy Process.
Intell. Autom. Soft Comput., 2011

2007
A-ary Tree-based Minimum Exact Cover of Leaf Set for Secure Group Communication in Grids.
Proceedings of the Grid and Cooperative Computing, 2007

2004
An Efficient Scheduling Algorithm for Dependent Tasks.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

Secure Dynamic Source Routing Protocol.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

A Self-Stabilizing Distributed Multicast Algorithm for Mobile Ad-Hoc Networks.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
A Multicast Routing Algorithm for P2P Networks.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...