default search action
Jiayu Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2008
- [b1]Jiayu Tang:
Automatic image annotation and object detection. University of Southampton, UK, 2008
Journal Articles
- 2016
- [j4]Tianzhu Wen, Aiqiang Xu, Jiayu Tang:
Study on extension negative selection algorithm. Int. J. High Perform. Comput. Netw. 9(1/2): 1-7 (2016) - 2013
- [j3]Paul D. Clough, Mark Sanderson, Jiayu Tang, Tim Gollins, Amy Warner:
Examining the Limits of Crowdsourcing for Relevance Assessment. IEEE Internet Comput. 17(4): 32-38 (2013) - 2011
- [j2]Paul D. Clough, Jiayu Tang, Mark M. Hall, Amy Warner:
Linking archival data to location: a case study at the UK National Archives. Aslib Proc. 63(2/3): 127-147 (2011) - 2007
- [j1]Jiayu Tang, Paul H. Lewis:
A Study of Quality Issues for Image Auto-Annotation With the Corel Dataset. IEEE Trans. Circuits Syst. Video Technol. 17(3): 384-389 (2007)
Conference and Workshop Papers
- 2022
- [c23]Shanshan Lu, Fujiang Liu, Fushou Liu, Peng Li, Jiayu Tang, Weihua Lin, Yan Guo:
Spatio-Temporal Variability of Global Aerosol Optical Depth During 2000-2019. SpatialDI 2022: 162-174 - 2021
- [c22]Qiwei Zhong, Guanxiong Zeng, Danqing Zhu, Yang Zhang, Wangli Lin, Ben Chen, Jiayu Tang:
Leveraging Domain Agnostic and Specific Knowledge for Acronym Disambiguation. SDU@AAAI 2021 - [c21]Danqing Zhu, Wangli Lin, Yang Zhang, Qiwei Zhong, Guanxiong Zeng, Weilin Wu, Jiayu Tang:
AT-BERT: Adversarial Training BERT for Acronym Identification Winning Solution for SDU@AAAI-21. SDU@AAAI 2021 - [c20]Ting Liang, Guanxiong Zeng, Qiwei Zhong, Jianfeng Chi, Jinghua Feng, Xiang Ao, Jiayu Tang:
Credit Risk and Limits Forecasting in E-Commerce Consumer Lending Service via Multi-view-aware Mixture-of-experts Nets. WSDM 2021: 229-237 - 2020
- [c19]Yang Liu, Xiang Ao, Qiwei Zhong, Jinghua Feng, Jiayu Tang, Qing He:
Alike and Unlike: Resolving Class Imbalance Problem in Financial Credit Risk Assessment. CIKM 2020: 2125-2128 - [c18]Jianfeng Chi, Guanxiong Zeng, Qiwei Zhong, Ting Liang, Jinghua Feng, Xiang Ao, Jiayu Tang:
Learning to Undersampling for Class Imbalanced Credit Risk Forecasting. ICDM 2020: 72-81 - [c17]Can Liu, Qiwei Zhong, Xiang Ao, Li Sun, Wangli Lin, Jinghua Feng, Qing He, Jiayu Tang:
Fraud Transactions Detection via Behavior Tree with Local Intention Calibration. KDD 2020: 3035-3043 - [c16]Qiwei Zhong, Yang Liu, Xiang Ao, Binbin Hu, Jinghua Feng, Jiayu Tang, Qing He:
Financial Defaulter Detection on Online Credit Payment via Multi-view Attributed Heterogeneous Information Network. WWW 2020: 785-795 - 2019
- [c15]Qiwei Zhong, Jiayu Tang, Jinghua Feng, Jianfeng Chi:
Inquiry Spam Detection via Jointly Exploiting Temporal-Categorical Behavior and Linguistics. ICDM 2019: 1516-1521 - 2014
- [c14]Chong Kuang, Jiayu Tang, Zhiyuan Liu, Maosong Sun:
ImgWordle: image and text visualization for events in microblogging services. AVI 2014: 371-372 - 2013
- [c13]Jiayu Wu, Zhiyong Fu, Zhiyuan Liu, Xu Lin, Jiayu Tang, Jiajia Pan, Chen Zhao:
Creating reflections in public emotion visualization: prototype exploration on traffic theme. Creativity & Cognition 2013: 357-361 - [c12]Jiayu Tang, Zhiyuan Liu, Maosong Sun:
Measuring and Visualizing Interest Similarity between Microblog Users. WAIM 2013: 478-489 - 2012
- [c11]Jiayu Wu, Zhiyong Fu, Zhiyuan Liu, Jiajia Pan, Huiling Long, Xu Lin, Haoqing He, Xinxiong Chen, Jiayu Tang:
City Flow: Prototype Exploration for Visualizing Urban Traffic Conversations. SocialCom/PASSAT 2012: 481-489 - 2010
- [c10]Jiayu Tang, Mark Sanderson:
Evaluation and User Preference Study on Spatial Diversity. ECIR 2010: 179-190 - [c9]Jiayu Tang, Mark Sanderson:
Spatial diversity, do users appreciate it? GIR 2010 - 2009
- [c8]Mark Sanderson, Jiayu Tang, Thomas Arni, Paul D. Clough:
What Else Is There? Search Diversity Examined. ECIR 2009: 562-569 - [c7]Monica Lestari Paramita, Jiayu Tang, Mark Sanderson:
Generic and Spatial Approaches to Image Search Results Diversification. ECIR 2009: 603-610 - 2008
- [c6]Jiayu Tang, Paul H. Lewis:
Non-negative matrix factorisation for object class discovery and image auto-annotation. CIVR 2008: 105-112 - [c5]Jiayu Tang, Thomas Arni, Mark Sanderson, Paul D. Clough:
Building a Diversity Featured Search System by Fusing Existing Tools. CLEF 2008: 560-567 - [c4]Jiayu Tang, Thomas Arni, Mark Sanderson, Paul D. Clough:
Building a Diversity Featured Search System by Fusing Existing Tools. CLEF (Working Notes) 2008 - 2007
- [c3]Jiayu Tang, Paul H. Lewis:
Using multiple segmentations for image auto-annotation. CIVR 2007: 581-586 - [c2]Jiayu Tang, Paul H. Lewis:
An image based feature space and mapping for linking regions and words. VISAPP (2) 2007: 29-35 - 2006
- [c1]Jiayu Tang, Jonathon S. Hare, Paul H. Lewis:
Image Auto-Annotation using a Statistical Model with Salient Regions. ICME 2006: 525-528
Informal and Other Publications
- 2021
- [i3]Danqing Zhu, Wangli Lin, Yang Zhang, Qiwei Zhong, Guanxiong Zeng, Weilin Wu, Jiayu Tang:
AT-BERT: Adversarial Training BERT for Acronym Identification Winning Solution for SDU@AAAI-21. CoRR abs/2101.03700 (2021) - [i2]Qiwei Zhong, Guanxiong Zeng, Danqing Zhu, Yang Zhang, Wangli Lin, Ben Chen, Jiayu Tang:
Leveraging Domain Agnostic and Specific Knowledge for Acronym Disambiguation. CoRR abs/2107.00316 (2021) - [i1]Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, Xiaofeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen:
Adversarial Attacks on ML Defense Models Competition. CoRR abs/2110.08042 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint