default search action
Chi Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Chi Jiang, Yi Zhang, Yang Liu, Jing Peng:
Tensor improve equivariant graph neural network for molecular dynamics prediction. Comput. Biol. Chem. 110: 108053 (2024) - [j13]Yi Zhang, Jing Peng, Baitai Cheng, Yang Liu, Chi Jiang:
MMR: A Multi-view Merge Representation model for Chemical-Disease relation extraction. Comput. Biol. Chem. 110: 108063 (2024) - [j12]Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang:
User financial credit analysis for blockchain regulation. Comput. Electr. Eng. 113: 109008 (2024) - [c7]Chi Jiang, Xihan Liu, Shenao Wang, Jinzhuo Liu, Yin Zhang:
EFEVD: Enhanced Feature Extraction for Smart Contract Vulnerability Detection. IJCAI 2024: 4246-4254 - 2023
- [j11]Chi Jiang, Xiao Ma, Jiangfeng Zeng, Yin Zhang, Tingting Yang, Qiumiao Deng:
TAPRec: time-aware paper recommendation via the modeling of researchers' dynamic preferences. Scientometrics 128(6): 3453-3471 (2023) - [j10]Jing Li, Jiahui Yang, Hui Cai, Chi Jiang, Qun Jiang, Yue Xie, Zimeng Lu, Lingzhi Li, Guanqun Sun:
The Empty-Nest Power User Management Based on Data Mining Technology. Sensors 23(5): 2485 (2023) - [j9]Guangquan Cheng, Chi Jiang, Binglei Yue, Ranran Wang, Bander A. Alzahrani, Yin Zhang:
AI-Driven Proactive Content Caching for 6G. IEEE Wirel. Commun. 30(3): 180-188 (2023) - [c6]Chi Jiang, Yupeng Chen, Manhua Shi, Yin Zhang:
Typical Contract Graph Feature Enhanced Smart Contract Vulnerability Detection. ACPR (2) 2023: 59-73 - [c5]Guojin Sun, Chi Jiang, Jinqing Shen, Yin Zhang:
SCOBERT: A Pre-Trained BERT for Smart Contract Vulnerability Detection. DSC 2023: 24-30 - [c4]Chi Jiang, Guojin Sun, Jinqing Shen, Binglei Yue, Yin Zhang:
Multi-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology. ICA3PP (5) 2023: 299-312 - 2022
- [j8]Yin Zhang, Chi Jiang, Binglei Yue, Jiafu Wan, Mohsen Guizani:
Information fusion for edge intelligence: A survey. Inf. Fusion 81: 171-186 (2022) - [c3]Chi Jiang, Li Xiao Zhang, Wu Yong Zhao, Jie Shu Lei, Wei-Zhi Huang:
Spatial spectrum estimation algorithm of polarization sensitive array based on compensating spatial domain manifold matrix. ICCIP 2022: 149-155 - [c2]Binglei Yue, Chi Jiang, Ranran Wang, Haojiang Ye, Yin Zhang:
Deep learning-based CSI feedback for IoT-oriented massive MIMO systems. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 739-746 - 2021
- [j7]Baojian Ji, Feng Hong, Ang Shen, Wei Xv, Chi Jiang:
An Isolated Single-Stage Four-Quadrant Inverter With Energy Storage Capacitor. IEEE Access 9: 79643-79650 (2021) - [j6]Yin Zhang, Huimin Lu, Chi Jiang, Xin Li, Xinliang Tian:
Aspect-Based Sentiment Analysis of User Reviews in 5G Networks. IEEE Netw. 35(4): 228-233 (2021) - [j5]Huimin Lu, Yin Zhang, Yujie Li, Chi Jiang, Haider Abbas:
User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications. IEEE Trans. Intell. Transp. Syst. 22(6): 3521-3532 (2021) - 2020
- [j4]Ranran Wang, Xiao Ma, Chi Jiang, Yi Ye, Yin Zhang:
Heterogeneous information network-based music recommendation system in mobile networks. Comput. Commun. 150: 429-437 (2020) - [c1]Ranran Wang, Gang Hu, Chi Jiang, Huimin Lu, Yin Zhang:
Data Analytics for the COVID-19 Epidemic. COMPSAC 2020: 1261-1266
2010 – 2019
- 2019
- [j3]Yuanguo Liu, Chi Jiang:
Recognition of Shooter's Emotions Under Stress Based on Affective Computing. IEEE Access 7: 62338-62343 (2019) - [j2]Weiyang Chen, Xiaofei Zhang, Chi Jiang:
Two-Dimensional DOA Estimation for Planar Array Using a Successive Propagator Method. J. Circuits Syst. Comput. 28(10): 1950161:1-1950161:19 (2019) - [j1]Hong Xue, Yi Yuan, Chi Jiang, Bo-Yu Cai:
Difference Measure Method of Risk Probability Distribution Based on Moment Generating Function and Fuzzy Data Stream Clustering. J. Inf. Sci. Eng. 35(6): 1397-1417 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint