default search action
Jiawei Su
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j15]Jiawei Su, Zhiming Luo, Sheng Lian, Dazhen Lin, Shaozi Li:
Consistency learning with dynamic weighting and class-agnostic regularization for semi-supervised medical image segmentation. Biomed. Signal Process. Control. 90: 105902 (2024) - [j14]Zhixin Liu, Yuanzi Wu, Jiawei Su, Zhaobin Wu, Kit Yan Chan:
Resource management for computational offload in MEC networks with energy harvesting and relay assistance. Comput. Commun. 222: 230-240 (2024) - [j13]Jiawei Su, Zhixin Liu, Yuanai Xie, Yaping Li, Kai Ma, Xinping Guan:
UEE-Delay Balanced Online Resource Optimization for Cooperative MEC-Enabled Task Offloading in Dynamic Vehicular Networks. IEEE Internet Things J. 11(7): 11496-11507 (2024) - [j12]Jiawei Su, Zhiming Luo, Sheng Lian, Dazhen Lin, Shaozi Li:
Mutual learning with reliable pseudo label for semi-supervised medical image segmentation. Medical Image Anal. 94: 103111 (2024) - [j11]Jiawei Su, Zhiming Luo, Chengji Wang, Sheng Lian, Xuejuan Lin, Shaozi Li:
Reconstruct incomplete relation for incomplete modality brain tumor segmentation. Neural Networks 180: 106657 (2024) - 2023
- [j10]Zhixin Liu, Jiawei Su, Yuanai Xie, Yazhou Yuan, Yi Yang, Xinping Guan:
Distributed robust power control in two-tier vehicle networks under uncertain channel environments. Digit. Commun. Networks 9(3): 734-742 (2023) - [j9]Chengji Wang, Jiawei Su, Zhiming Luo, Donglin Cao, Yaojin Lin, Shaozi Li:
Text-based Person Search via Virtual Attribute Learning. Int. J. Softw. Informatics 13(2): 157-176 (2023) - [j8]Jiawei Su, Zhixin Liu, Yuan-Ai Xie, Kit Yan Chan, Xinping Guan:
Dynamic Resource Allocation in Queue-Constrained and Delay-Sensitive Vehicular Networks. IEEE Trans. Intell. Veh. 8(10): 4434-4444 (2023) - [j7]Jiawei Su, Zhixin Liu, Yuanai Xie, Kai Ma, Hongyang Du, Jiawen Kang, Dusit Niyato:
Semantic Communication-Based Dynamic Resource Allocation in D2D Vehicular Networks. IEEE Trans. Veh. Technol. 72(8): 10784-10796 (2023) - 2022
- [j6]Jiawei Su, Zhiming Luo, Shaozi Li:
Consistent response for automated multilabel thoracic disease classification. Concurr. Comput. Pract. Exp. 34(23) (2022) - 2021
- [j5]Zhixin Liu, Jiawei Su, Yuanai Xie, Kai Ma, Yi Yang, Xinping Guan:
Resource Allocation in D2D Enabled Vehicular Communications: A Robust Stackelberg Game Approach Based on Price-Penalty Mechanism. IEEE Trans. Veh. Technol. 70(8): 8186-8200 (2021) - 2019
- [j4]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j3]Ruliang Xiao, Jiawei Su, Xin Du, Jianmin Jiang, Xinhong Lin, Li Lin:
SFAD: Toward effective anomaly detection based on session feature similarity. Knowl. Based Syst. 165: 149-156 (2019) - [j2]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - 2014
- [j1]Hefeng Wu, Ning Liu, Xiaonan Luo, Jiawei Su, Liangshi Chen:
Real-time background subtraction-based video surveillance of people by integrating local texture patterns. Signal Image Video Process. 8(4): 665-676 (2014)
Conference and Workshop Papers
- 2020
- [c5]Danilo Vasconcellos Vargas, Jiawei Su:
Understanding the One Pixel Attack: Propagation Maps and Locality Analysis. AISafety@IJCAI 2020 - 2018
- [c4]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c3]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. CANDAR Workshops 2018: 223-227 - 2017
- [c2]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. IWSEC 2017: 121-137 - 2015
- [c1]Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. ICISC 2015: 278-293
Informal and Other Publications
- 2024
- [i5]Yohei Nakayama, Jiawei Su:
Spatio-Temporal SwinMAE: A Swin Transformer based Multiscale Representation Learner for Temporal Satellite Imagery. CoRR abs/2405.02512 (2024) - 2019
- [i4]Danilo Vasconcellos Vargas, Jiawei Su:
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis. CoRR abs/1902.02947 (2019) - 2018
- [i3]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - [i2]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking Convolutional Neural Network using Differential Evolution. CoRR abs/1804.07062 (2018) - 2017
- [i1]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One pixel attack for fooling deep neural networks. CoRR abs/1710.08864 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint