default search action
Jianguo Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Hao Liu, Jingjing Wu, Feng Li, Jianguo Jiang, Richang Hong:
SYRER: Synergistic Relational Reasoning for RGB-D Cross-Modal Re-Identification. IEEE Trans. Multim. 26: 5600-5614 (2024) - [c89]Ran Liu, Ming Liu, Min Yu, He Zhang, Jianguo Jiang, Gang Li, Weiqing Huang:
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. ACL (Findings) 2024: 9632-9651 - [c88]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. ECAI 2024: 3709-3716 - [c87]Jiawen Wang, Boquan Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Fuqiang Du, Xiang Meng, Weiqing Huang:
Assessing Backdoor Risk in Deepfake Detection. IFIP Int. Conf. Digital Forensics 2024: 99-115 - [c86]Gengwang Li, Min Yu, Dongliang Fang, Gang Li, Xiang Meng, Jianguo Jiang, Weiqing Huang:
X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation. MILCOM 2024: 1082-1087 - [c85]Xiu Ma, Xiaoze Liu, Ce Li, Ziyang Yu, Qi Zhang, Qiujian Lv, Yan Wang, Jianguo Jiang:
BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning. WASA (1) 2024: 333-346 - [i6]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. CoRR abs/2408.10115 (2024) - 2023
- [j61]Jianguo Jiang, Shang Jiang, Yi Liu, Siye Wang, Yanfang Zhang, Yue Feng, Ziwen Cao:
Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals. Comput. Networks 229: 109751 (2023) - [c84]Yuanyuan Wang, Gengwang Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang:
A Dynamic Malicious Document Detection Method Based on Multi-Memory Features. IFIP Int. Conf. Digital Forensics 2023: 203-218 - [c83]Xu Wang, Jianguo Jiang, Yan Wang, Qiujian Lv, Leiqi Wang:
UAG: User Action Graph Based on System Logs for Insider Threat Detection. ISCC 2023: 1027-1032 - 2022
- [j60]Dan Zhang, Jianguo Jiang, Baonan Wang:
Multisource Oscillation Suppression Control of Magnetic Levitation High Speed Permanent Magnet Motor. IEEE Access 10: 106506-106512 (2022) - [j59]Hongbo Bi, Lina Yang, Hui-Hui Zhu, Di Lu, Jianguo Jiang:
STEG-Net: Spatiotemporal Edge Guidance Network for Video Salient Object Detection. IEEE Trans. Cogn. Dev. Syst. 14(3): 902-915 (2022) - [j58]Cuiqun Chen, Mang Ye, Meibin Qi, Jingjing Wu, Yimin Liu, Jianguo Jiang:
Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification. IEEE Trans. Circuits Syst. Video Technol. 32(9): 6100-6112 (2022) - [j57]Cuiqun Chen, Mang Ye, Meibin Qi, Jingjing Wu, Jianguo Jiang, Chia-Wen Lin:
Structure-Aware Positional Transformer for Visible-Infrared Person Re-Identification. IEEE Trans. Image Process. 31: 2352-2364 (2022) - [j56]Jingjing Wu, Jianguo Jiang, Meibin Qi, Cuiqun Chen, Yimin Liu:
Improving Feature Discrimination for Object Tracking by Structural-similarity-based Metric Learning. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 90:1-90:23 (2022) - [j55]Jingjing Wu, Jianguo Jiang, Meibin Qi, Cuiqun Chen, Jingjing Zhang:
An End-to-end Heterogeneous Restraint Network for RGB-D Cross-modal Person Re-identification. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 109:1-109:22 (2022) - [c82]Xiu Ma, Leiqi Wang, Qiujian Lv, Yan Wang, Qi Zhang, Jianguo Jiang:
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis. IJCNN 2022: 1-8 - [c81]Jinchao Feng, Runbo Zhao, Jianguo Jiang:
A Large Scale Document-Term Matching Method Based on Information Retrieval. ISPA/BDCloud/SocialCom/SustainCom 2022: 323-330 - 2021
- [j54]Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li, Weiqing Huang:
An end-to-end text spotter with text relation networks. Cybersecur. 4(1): 7 (2021) - [j53]Jingjing Wu, Jianguo Jiang, Meibin Qi, Xiaohong Li:
Towards accurate estimation for visual object tracking with multi-hierarchy feature aggregation. Neurocomputing 451: 252-264 (2021) - [j52]Jingjing Zhang, Xiaohong Li, Cuiqun Chen, Meibin Qi, Jingjing Wu, Jianguo Jiang:
Global-Local Graph Convolutional Network for cross-modality person re-identification. Neurocomputing 452: 137-146 (2021) - [j51]Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. J. Comput. Secur. 29(4): 403-421 (2021) - [j50]Meibin Qi, Suzhi Wang, Guanghong Huang, Jianguo Jiang, Jingjing Wu, Cuiqun Chen:
Mask-guided dual attention-aware network for visible-infrared person re-identification. Multim. Tools Appl. 80(12): 17645-17666 (2021) - [j49]Cuiqun Chen, Meibin Qi, Guanghong Huang, Jingjing Wu, Jianguo Jiang, Xiaohong Li:
Learning discriminative features with a dual-constrained guided network for video-based person re-identification. Multim. Tools Appl. 80(19): 28673-28696 (2021) - [j48]Zhongzheng Zhou, Jianguo Jiang, Shu Ye, Cong Liu, Dan Zhang:
A Г-Source Circuit Breaker for DC Microgrid Protection. IEEE Trans. Ind. Electron. 68(3): 2310-2320 (2021) - [c80]Bo Tan, Meibin Qi, Cuiqun Chen, Fang Su, Jianguo Jiang:
Learning Rubost Features with Refined Spatial Interactions of Inter-part for Person Re-IDentification. CCEAI 2021: 153-156 - [c79]Jianguo Jiang, Boquan Li, Shuai Yu, Chao Liu, Shaohua An, Mingqi Liu, Min Yu:
A Residual Fingerprint-Based Defense Against Adversarial Deepfakes. HPCC/DSS/SmartCity/DependSys 2021: 797-804 - [c78]Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li, Chao Liu, Weiqing Huang:
Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning. IFIP Int. Conf. Digital Forensics 2021: 135-155 - [c77]Degang Sun, Yunting Guo, Min Yu, Gang Li, Chao Liu, Jianguo Jiang, Weiqing Huang:
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN 2021: 1-8 - [c76]Weiqing Huang, Chenggang Jia, Min Yu, Gang Li, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. ISCC 2021: 1-7 - [c75]Jianguo Jiang, Xu Wang, Yan Wang, Qiujian Lv, Meichen Liu, Tingting Wang, Leiqi Wang:
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph. ISCC 2021: 1-6 - [c74]Qingsong Lv, Ming Ding, Qiang Liu, Yuxiang Chen, Wenzheng Feng, Siming He, Chang Zhou, Jianguo Jiang, Yuxiao Dong, Jie Tang:
Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks. KDD 2021: 1150-1160 - [c73]Chao Liu, Xintong Wei, Min Yu, Gang Li, Xiangmei Ma, Jianguo Jiang, Weiqing Huang:
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. KSEM 2021: 162-173 - [c72]Jianguo Jiang, Qiang Liu, Min Yu, Gang Li, Mingqi Liu, Chao Liu, Weiqing Huang:
Landscape-Enhanced Graph Attention Network for Rumor Detection. KSEM 2021: 188-199 - [c71]Jianguo Jiang, Chenghao Wang, Min Yu, Chenggang Jia, Gang Li, Chao Liu, Weiqing Huang:
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. WASA (2) 2021: 147-159 - [i5]Qingsong Lv, Ming Ding, Qiang Liu, Yuxiang Chen, Wenzheng Feng, Siming He, Chang Zhou, Jianguo Jiang, Yuxiao Dong, Jie Tang:
Are we really making much progress? Revisiting, benchmarking, and refining heterogeneous graph neural networks. CoRR abs/2112.14936 (2021) - 2020
- [j47]Cong Liu, Jiayan Jiang, Jianguo Jiang, Zhongzheng Zhou:
Enhanced Grid-Connected Phase-Locked Loop Based on a Moving Average Filter. IEEE Access 8: 5308-5315 (2020) - [j46]Shu Ye, Jianguo Jiang, Zhongzheng Zhou, Cong Liu, Yunlong Liu:
A Fast and Intelligent Open-Circuit Fault Diagnosis Method for a Five-Level NNPP Converter Based on an Improved Feature Extraction and Selection Model. IEEE Access 8: 52852-52862 (2020) - [j45]Wei Luo, Dafang Wei, Jianguo Jiang:
Impedance Modeling and Stability Analysis of the IMAF-PLL-Based NPC Three-Level LCL Grid-Connected Inverter. IEEE Access 8: 217615-217627 (2020) - [j44]Jianguo Jiang, Kaiyuan Jin, Meibin Qi, Qian Wang, Jingjing Wu, Cuiqun Chen:
A Cross-Modal Multi-granularity Attention Network for RGB-IR Person Re-identification. Neurocomputing 406: 59-67 (2020) - [j43]Jingjing Wu, Hao Liu, Jianguo Jiang, Meibin Qi, Bo Ren, Xiaohong Li, Yashen Wang:
Person Attribute Recognition by Sequence Contextual Relation Learning. IEEE Trans. Circuits Syst. Video Technol. 30(10): 3398-3412 (2020) - [j42]Guofu Zhang, Zhaopin Su, Miqing Li, Meibin Qi, Jianguo Jiang, Xin Yao:
A Task-Oriented Heuristic for Repairing Infeasible Solutions to Overlapping Coalition Structure Generation. IEEE Trans. Syst. Man Cybern. Syst. 50(3): 785-801 (2020) - [j41]Siye Wang, Ziwen Cao, Yanfang Zhang, Weiqing Huang, Jianguo Jiang:
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. Wirel. Commun. Mob. Comput. 2020: 6937912:1-6937912:12 (2020) - [c70]Jianguo Jiang, Yue Lu, Min Yu, Yantao Jia, Jiafeng Guo, Chao Liu, Weiqing Huang:
CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection. ECAI 2020: 1834-1841 - [c69]Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv, Bin Lv, Weiqing Huang:
Similarity of Binaries Across Optimization Levels and Obfuscation. ESORICS (1) 2020: 295-315 - [c68]Jianguo Jiang, Zhaoce Liu, Min Yu, Gang Li, Song Li, Chao Liu, Weiqing Huang:
HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph. HPCC/DSS/SmartCity 2020: 328-335 - [c67]Jianguo Jiang, Shang Jiang, Bobai Zhao, Siye Wang, Mengnan Cai, Yanfang Zhang:
CS-Dict: Accurate Indoor Localization with CSI Selective Amplitude and Phase Based Regularized Dictionary Learning. ICA3PP (2) 2020: 677-689 - [c66]Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang:
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors. IFIP Int. Conf. Digital Forensics 2020: 57-72 - [c65]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ISCC 2020: 1-7 - [c64]Chao Liu, Xiangmei Ma, Min Yu, Xinghua Wu, Mingqi Liu, Jianguo Jiang, Weiqing Huang:
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition. KSEM (1) 2020: 174-185 - [c63]Meimei Li, Chen Lang, Min Yu, Yue Lu, Chao Liu, Jianguo Jiang, Weiqing Huang:
SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM (2) 2020: 288-299 - [c62]Yue Lu, Jianguo Jiang, Min Yu, Chao Liu, Chaochao Liu, Weiqing Huang, Zhiqiang Lv:
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis. KSEM (2) 2020: 450-461
2010 – 2019
- 2019
- [j40]Cuiqun Chen, Meibin Qi, Ning Yang, Wei Li, Jianguo Jiang:
Optimizing Multi-Granularity Region Similarity for Person Re-Identification. IEEE Access 7: 8847-8857 (2019) - [j39]Min Yu, Jianguo Jiang, Gang Li, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. Future Gener. Comput. Syst. 99: 517-526 (2019) - [j38]Meibin Qi, Jingxian Han, Jianguo Jiang, Hao Liu:
Deep feature representation and multiple metric ensembles for person re-identification in security surveillance system. Multim. Tools Appl. 78(19): 27029-27043 (2019) - [j37]Huifang Chu, Meibin Qi, Hao Liu, Jianguo Jiang:
Local region partition for person re-identification. Multim. Tools Appl. 78(19): 27067-27083 (2019) - [j36]Jingjing Wu, Jianguo Jiang, Meibin Qi, Hao Liu:
Independent metric learning with aligned multi-part features for video-based person re-identification. Multim. Tools Appl. 78(20): 29323-29341 (2019) - [c61]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. CF 2019: 24-31 - [c60]Baole Wei, Min Yu, Kai Chen, Jianguo Jiang:
Deep-BIF: Blind Image Forensics Based on Deep Learning. DSC 2019: 1-6 - [c59]Jianguo Jiang, Qilei Yin, Zhixin Shi, Qiwen Wang, Wei Zhou:
A New Hybrid Approach for C&C Channel Detection. HPCC/SmartCity/DSS 2019: 583-590 - [c58]Min Yu, Jianguo Jiang, Gang Li, Jingyuan Li, Chenzhe Lou, Chao Liu, Weiqing Huang, Yuanzhuo Wang:
A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction. HPCC/SmartCity/DSS 2019: 2317-2323 - [c57]Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang:
A Behavior-Based Method for Distinguishing the Type of C&C Channel. ICA3PP (1) 2019: 624-636 - [c56]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Weiqing Huang, Lejun Fan, Jianfeng Xia:
Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection. ICANN (3) 2019: 711-723 - [c55]Siran Lei, Mengqi Cheng, Jianguo Jiang:
Tactics for Proving Separation Logic Assertion in Coq Proof Assistant. ICVISP 2019: 99:1-99:5 - [c54]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv:
A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning. IPCCC 2019: 1-9 - [c53]Jianguo Jiang, Song Li, Min Yu, Gang Li, Chao Liu, Kai Chen, Hui Liu, Weiqing Huang:
Android Malware Family Classification Based on Sensitive Opcode Sequence. ISCC 2019: 1-7 - [c52]Chao Liu, Xinghua Wu, Min Yu, Gang Li, Jianguo Jiang, Weiqing Huang, Xiang Lu:
A Two-Stage Model Based on BERT for Short Fake News Detection. KSEM (2) 2019: 172-183 - [c51]Biao Qi, Jianguo Jiang, Zhixin Shi, Meimei Li, Wei Fan:
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine. KSEM (1) 2019: 275-286 - [c50]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. MILCOM 2019: 1-6 - [c49]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. MILCOM 2019: 109-114 - [c48]Xiaozhen Zhang, Weiqiang Kong, Jianguo Jiang, Gang Hou, Akira Fukuda:
Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration. TASE 2019: 113-120 - 2018
- [j35]Dan Zhang, Jianguo Jiang:
A reliable speed controller for suppressing low frequency concussion of electric vehicle. Microelectron. Reliab. 88-90: 1256-1260 (2018) - [j34]Hao Liu, Zequn Jie, Jayashree Karlekar, Meibin Qi, Jianguo Jiang, Shuicheng Yan, Jiashi Feng:
Video-Based Person Re-Identification With Accumulative Motion Context. IEEE Trans. Circuits Syst. Video Technol. 28(10): 2788-2802 (2018) - [j33]Zhaopin Su, Guofu Zhang, Feng Yue, Lejie Chang, Jianguo Jiang, Xin Yao:
SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking. IEEE Trans. Multim. 20(10): 2631-2644 (2018) - [c47]Wei Sun, Jianguo Jiang, Majing Su:
A Passive-Measurement-Guided Tree Network Surveying and Mapping Model. DSC 2018: 646-651 - [c46]Jianguo Jiang, Xuebin Yuan, Rui Mao:
Research on Role Mining Algorithms in RBAC. HPCCT 2018: 1-5 - [c45]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi:
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. ICCSP 2018: 77-81 - [c44]Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. IPCCC 2018: 1-7 - [c43]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li:
Comprehensive Behavior Profiling Model for Malware Classification. ISCC 2018: 129-135 - [c42]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Weiqing Huang, Fangtao Zhang:
Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis. KSEM (2) 2018: 221-231 - [c41]Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Weiqing Huang, Gang Li:
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment. MASS 2018: 64-72 - [c40]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Kunying Liu, Chao Liu, Min Yu, Prasant Mohapatra:
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails. MILCOM 2018: 1-6 - [c39]Jingjing Wu, Jianguo Jiang, Meibin Qi, Hao Liu, Meng Wang:
Video-Based Person Re-identification with Adaptive Multi-part Features Learning. PCM (1) 2018: 115-125 - [c38]Meibin Qi, Yonglai Wei, Kunpeng Gao, Jianguo Jiang, Jingjing Wu:
Re-Ranking Person Re-Identification with Forward and Reverse Sorting Constraints. PCM (2) 2018: 768-779 - [c37]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Jianguo Sun, Weiqing Huang, Zhiqiang Lv:
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks. PCM (2) 2018: 815-825 - [c36]Meibin Qi, Junxian Zeng, Jianguo Jiang, Cuiqun Chen:
Feature Fusion and Ellipse Segmentation for Person Re-identification. PRCV (1) 2018: 50-61 - [c35]Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. TrustCom/BigDataSE 2018: 727-736 - [c34]Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. TrustCom/BigDataSE 2018: 754-762 - [c33]Jianguo Jiang, Qian Yu, Min Yu, Gang Li, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. TrustCom/BigDataSE 2018: 1565-1569 - [i4]Hao Liu, Jingjing Wu, Jianguo Jiang, Meibin Qi, Bo Ren:
Sequence-based Person Attribute Recognition with Joint CTC-Attention Model. CoRR abs/1811.08115 (2018) - 2017
- [j32]Yu-Wei Lu, Jianguo Jiang, Meibin Qi, Shu Zhan, Jie Yang:
Segmentation method for medical image based on improved GrabCut. Int. J. Imaging Syst. Technol. 27(4): 383-390 (2017) - [j31]Zhaopin Su, Lejie Chang, Guofu Zhang, Jianguo Jiang, Feng Yue:
Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multim. Tools Appl. 76(7): 9363-9386 (2017) - [j30]Hao Liu, Jiashi Feng, Meibin Qi, Jianguo Jiang, Shuicheng Yan:
End-to-End Comparative Attention Networks for Person Re-Identification. IEEE Trans. Image Process. 26(7): 3492-3506 (2017) - [j29]Yanbin Hao, Tingting Mu, John Yannis Goulermas, Jianguo Jiang, Richang Hong, Meng Wang:
Unsupervised t-Distributed Video Hashing and Its Deep Hashing Extension. IEEE Trans. Image Process. 26(11): 5531-5544 (2017) - [j28]Zhenzhen Hu, Yonggang Wen, Luoqi Liu, Jianguo Jiang, Richang Hong, Meng Wang, Shuicheng Yan:
Visual Classification of Furniture Styles. ACM Trans. Intell. Syst. Technol. 8(5): 67:1-67:20 (2017) - [j27]Guofu Zhang, Zhaopin Su, Miqing Li, Feng Yue, Jianguo Jiang, Xin Yao:
Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems. IEEE Trans. Reliab. 66(4): 1193-1212 (2017) - [c32]Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. Inscrypt 2017: 383-403 - [c31]Hao Liu, Jiashi Feng, Zequn Jie, Jayashree Karlekar, Bo Zhao, Meibin Qi, Jianguo Jiang, Shuicheng Yan:
Neural Person Search Machines. ICCV 2017: 493-501 - [c30]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu:
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. ICDF2C 2017: 130-143 - [c29]Dan Zhang, Liang Zhang, Jianguo Jiang, Junjie Li, Baonan Wang, Zhongzheng Zhou:
Design of T-type three-level energy storage inverter and grid-connected control strategy. IECON 2017: 1072-1076 - [c28]Junjie Li, Zhang Dan, Jianguo Jiang:
Fast finite control set model predictive control for three-phase five-level nested neutral point piloted converter. IECON 2017: 1140-1145 - [c27]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang:
A Deep Learning Based Online Malicious URL and DNS Detection Scheme. SecureComm 2017: 438-448 - [c26]Yunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang:
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization. TrustCom/BigDataSE/ICESS 2017: 73-82 - [i3]Hao Liu, Zequn Jie, Jayashree Karlekar, Meibin Qi, Jianguo Jiang, Shuicheng Yan, Jiashi Feng:
Video-based Person Re-identification with Accumulative Motion Context. CoRR abs/1701.00193 (2017) - [i2]Hao Liu, Jiashi Feng, Zequn Jie, Jayashree Karlekar, Bo Zhao, Meibin Qi, Jianguo Jiang, Shuicheng Yan:
Neural Person Search Machines. CoRR abs/1707.06777 (2017) - 2016
- [j26]Ye Zhao, Richang Hong, Jianguo Jiang:
Visual summarization of image collections by fast RANSAC. Neurocomputing 172: 48-52 (2016) - [j25]Yang Liu, Guofu Zhang, Zhaopin Su, Feng Yue, Jianguo Jiang:
Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games. J. Comput. Sci. Technol. 31(6): 1136-1150 (2016) - [j24]Xu Zhang, Jianguo Jiang, Richang Hong, Yue Du:
基于低秩稀疏分解与协作表示的图像分类算法 (Image Classification Algorithm Based on Low Rank and Sparse Decomposition and Collaborative Representation). 计算机科学 43(7): 83-88 (2016) - [j23]Shijie Hao, Meng Wang, Richang Hong, Jianguo Jiang:
Spatially guided local Laplacian filter for nature image detail enhancement. Multim. Tools Appl. 75(3): 1529-1542 (2016) - [c25]Bo Yang, Ning Li, Zhigang Lu, Jianguo Jiang:
Event Detection with Convolutional Neural Networks for Forensic Investigation. Intelligent Information Processing 2016: 97-107 - [c24]Bo Yang, Jianguo Jiang, Ning Li:
Towards Discovering Covert Communication Through Email Spam. Intelligent Information Processing 2016: 191-201 - [c23]Meibin Qi, Jingxian Han, Jianguo Jiang:
Person Re-identification by Multiple Feature Representations and Metric Learning. IVS 2016: 83-90 - [c22]Yunan Zhang, Qingjia Huang, Xinjian Ma, Zeming Yang, Jianguo Jiang:
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification. Trustcom/BigDataSE/ISPA 2016: 965-973 - [c21]Jianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv:
Botnet Detection Method Analysis on the Effect of Feature Extraction. Trustcom/BigDataSE/ISPA 2016: 1882-1888 - [i1]Hao Liu, Jiashi Feng, Meibin Qi, Jianguo Jiang, Shuicheng Yan:
End-to-End Comparative Attention Networks for Person Re-identification. CoRR abs/1606.04404 (2016) - 2015
- [j22]Guofu Zhang, Renzhi Yang, Zhaopin Su, Feng Yue, Yuqi Fan, Meibin Qi, Jianguo Jiang:
Using binary particle swarm optimization to search for maximal successful coalition. Appl. Intell. 42(2): 195-209 (2015) - [j21]Xu Zhang, Shijie Hao, Chenyang Xu, Xueming Qian, Meng Wang, Jianguo Jiang:
Image classification based on low-rank matrix recovery and Naive Bayes collaborative representation. Neurocomputing 169: 110-118 (2015) - [j20]Hao Liu, Meibin Qi, Jianguo Jiang:
Kernelized Relaxed Margin Components Analysis for Person Re-identification. IEEE Signal Process. Lett. 22(7): 910-914 (2015) - [c20]Jianguo Jiang, Xiang Jing, Bin Lv, Meimei Li:
A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine. CIS 2015: 303-307 - 2014
- [j19]Tianfeng Zhou, Meibin Qi, Jianguo Jiang, Xin Wang, Shijie Hao, Yulong Jin:
Person Re-identification based on nonlinear ranking with difference vectors. Inf. Sci. 279: 604-614 (2014) - [j18]Richang Hong, Wenyi Cao, Jianxin Pang, Jianguo Jiang:
Directional projection based image fusion quality metric. Inf. Sci. 281: 611-619 (2014) - [j17]Ping Ji, Na Zhao, Shijie Hao, Jianguo Jiang:
Automatic image annotation by semi-supervised manifold kernel density estimation. Inf. Sci. 281: 648-660 (2014) - [j16]Guifeng Wang, Jianguo Jiang, Shutong Qiao, Lifeng Guo:
Research on the Multilevel STATCOM based on the H-bridge Cascaded. J. Networks 9(1): 147-152 (2014) - [j15]Zhenzhen Hu, Si Liu, Jianguo Jiang, Richang Hong, Meng Wang, Shuicheng Yan:
PicWords: Render a Picture by Packing Keywords. IEEE Trans. Multim. 16(4): 1156-1164 (2014) - [c19]Jianguo Jiang, Hao Liu, Meibin Qi:
Non-linear metric learning with multiple features for person re-identification. ChinaSIP 2014: 364-368 - [c18]Yao Yao, Yanbin Hao, Jianguo Jiang, Xueliang Liu, Richang Hong:
On improving behavior subtraction. SMC 2014: 4135-4140 - 2013
- [j14]Shijie Hao, Jianguo Jiang, Yanrong Guo, Hong Li:
Active learning based intervertebral disk classification combining shape and texture similarities. Neurocomputing 101: 252-257 (2013) - [j13]Richang Hong, Linxie Tang, Jun Hu, Guangda Li, Jianguo Jiang:
Advertising object in web videos. Neurocomputing 119: 118-124 (2013) - [j12]Junzhao Li, Hongliang Yao, Jian Chang, Shuai Fang, Jianguo Jiang:
Intervention Learning of Local Causal Structure Based on Sensitivity Analysis. J. Comput. 8(4): 912-919 (2013) - [j11]Hua-Zheng Du, Na Xia, Jianguo Jiang, Lina Xu, Rong Zheng:
A Monte Carlo Enhanced PSO Algorithm for Optimal QoM in Multi-Channel Wireless Networks. J. Comput. Sci. Technol. 28(3): 553-563 (2013) - [j10]Shijie Hao, Jianguo Jiang, Yanrong Guo, Shu Zhan:
ε-Isometryε-Isometry based shape approximation for image content representation. Signal Process. 93(8): 2293-2304 (2013) - [j9]Yanrong Guo, Guorong Wu, Jianguo Jiang, Dinggang Shen:
Robust Anatomical Correspondence Detection by Hierarchical Sparse Graph Matching. IEEE Trans. Medical Imaging 32(2): 268-277 (2013) - [c17]Ye Zhao, Richang Hong, Jianguo Jiang, Jing Wen, Hengheng Zhang:
Image matching by fast random sample consensus. ICIMCS 2013: 159-162 - [c16]Yun Wan, Steven Liu, Jianguo Jiang:
Systematic modeling and control of indirect modular multilevel converter (MMC) with grid unbalance estimation. IECON 2013: 1349-1354 - [c15]Yanrong Guo, Yiqiang Zhan, Yaozong Gao, Jianguo Jiang, Dinggang Shen:
MR prostate segmentation via distributed discriminative dictionary (DDD) learning. ISBI 2013: 868-871 - 2012
- [j8]Jianguo Jiang, Jingzhong Zhang:
A review and prospect of readable machine proofs for geometry theorems. J. Syst. Sci. Complex. 25(4): 802-820 (2012) - [c14]Yanrong Guo, Guorong Wu, Yakang Dai, Jianguo Jiang, Dinggang Shen:
Robust Anatomical Correspondence Detection by Graph Matching with Sparsity Constraint. MCV 2012: 20-28 - 2011
- [j7]Guofu Zhang, Jianguo Jiang, Changhua Lu, Zhaopin Su, Hua Fang, Yang Liu:
A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions. Appl. Soft Comput. 11(2): 2164-2172 (2011) - [j6]Zhaopin Su, Jianguo Jiang, Chang-Yong Liang, Guofu Zhang:
Path selection in disaster response management based on Q-learning. Int. J. Autom. Comput. 8(1): 100-106 (2011) - [j5]Jianguo Jiang, Jichun Wu:
A transition rate transformation method for solving advection-dispersion equation. J. Comput. Phys. 230(14): 5556-5563 (2011) - [j4]Fang Zhou, Guangxue Yue, Jianguo Jiang, Peizhen Wang:
A Novel Intelligent Technique for Recognition of Coke Optical Texture. J. Softw. 6(8): 1476-1483 (2011) - [j3]Richang Hong, Meng Wang, Xiao-Tong Yuan, Mengdi Xu, Jianguo Jiang, Shuicheng Yan, Tat-Seng Chua:
Video accessibility enhancement for hearing-impaired users. ACM Trans. Multim. Comput. Commun. Appl. 7(Supplement): 24 (2011) - [c13]Yanrong Guo, Jianguo Jiang, Shijie Hao, Shu Zhan:
Distribution-Based Active Contour Model for Medical Image Segmentation. ICIG 2011: 61-65 - [c12]Shijie Hao, Jianguo Jiang, Yanrong Guo, Shu Zhan:
Intervertebral Disc Shape Analysis with Geodesic Metric in Shape Space. ICIG 2011: 320-324 - [p1]Zhaopin Su, Shiguo Lian, Guofu Zhang, Jianguo Jiang:
Chaos-Based Video Encryption Algorithms. Chaos-Based Cryptography 2011: 205-226 - 2010
- [j2]Guofu Zhang, Jianguo Jiang, Zhaopin Su, Meibin Qi, Hua Fang:
Searching for overlapping coalitions in multiple virtual organizations. Inf. Sci. 180(17): 3140-3156 (2010) - [j1]Jianguo Jiang, Yang Liu, Zhaopin Su, Guofu Zhang, Shiyi Xing:
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling. J. Multim. 5(5): 464-472 (2010) - [c11]Jianguo Jiang, Wenju Zhang, Man Xuan:
The SLDSRC Rate Control Scheme for H.264. MMM 2010: 683-688
2000 – 2009
- 2009
- [c10]Fang Zhou, Jianguo Jiang, Peizhen Wang:
A Joint Scheme for Delay-Limited Video Transmission over Energy-Constrained MANET. CSIE (6) 2009: 150-154 - [c9]Man Xuan, Jianguo Jiang:
Video Security Algorithm Aiming at the Need of Privacy Protection. FSKD (5) 2009: 473-477 - 2008
- [c8]Na Xia, Mei Tang, Jianguo Jiang, Dun Li, Hao-wei Qian:
Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks. ISCSCT (1) 2008: 216-219 - 2007
- [c7]Jianguo Jiang, Zhaopin Su, Na Xia, Guofu Zhang:
Research on Comprehensive Evaluation of Agent Coalition Based on D-S Evidential Reasoning. FSKD (2) 2007: 477-481 - [c6]Na Xia, Jianguo Jiang, Meibin Qi, Chunhua Yu, Yue Huang, Qi Zhang:
A WSN Coalition Formation Algorithm Based on Ant Colony with Dual-Negative Feedback. International Conference on Computational Science (4) 2007: 1139-1146 - [c5]Jianguo Jiang, Yong Li, Na Xia:
Greedy Algorithm Solution to Agent Coalition for Single Task. ICNC (4) 2007: 718-722 - [c4]Xiang Yin, Jianguo Jiang, Na Xia:
A Novel Strategy of Coalition Evolvement Based on Interest. SNPD (1) 2007: 611-615 - 2006
- [c3]Guofu Zhang, Jianguo Jiang, Na Xia, Zhaopin Su:
Particle Swarms Cooperative Optimization for Coalition Generation Problem. SEAL 2006: 166-173 - 2004
- [c2]Na Xia, Jianguo Jiang, Yaling Hu:
Solution to Agent Coalition Problem using Improved Ant Colony Optimization Algorithm. IAT 2004: 475-478 - 2001
- [c1]Hao Chen, Xianjun Meng, Jianguo Jiang:
Two quadrants control of the switched reluctance motor drive for application in electric drive bicycle. SMC 2001: 3163-3168
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-23 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint