default search action
Jiandong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j93]Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen:
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction. Ad Hoc Networks 152: 103303 (2024) - [j92]Haitao Wang, Hang Wang, Xiaoyang Liang, Jiandong Wang, Xuefeng Qiu, Chuanjuan Wang, Guangyong Li:
Infiltration simulation and system design of biogas slurry drip irrigation using HYDRUS model. Comput. Electron. Agric. 218: 108682 (2024) - [j91]Jiandong Wang:
Investigation on security management risk assessment of accounting resource sharing under internet of things big data technology. Int. J. Manuf. Technol. Manag. 38(4/5): 426-445 (2024) - [j90]Zhen Wang, Jiandong Wang, Jilin Hou:
Multivariate Alarm Monitoring for Non-Convex Normal Operating Zones Based on Search Cones. IEEE Trans Autom. Sci. Eng. 21(1): 452-462 (2024) - [j89]Zhen Wang, Jiandong Wang, Jindong Liu:
Multivariate Process Monitoring for Safe Operation of Condensers in Thermal Power Plants Based on Normal Operating Zones. IEEE Trans. Control. Syst. Technol. 32(4): 1399-1409 (2024) - [j88]Jiandong Wang, Xiaotong Xing:
Identification of Continuous-Time Dynamic Systems With Uncertainties Measured by Fuzzy Sets Subject to Model Structure Errors. IEEE Trans. Fuzzy Syst. 32(5): 3293-3300 (2024) - [j87]Xiaotong Xing, Jiandong Wang, Peng Wei, Song Gao, Xiangkun Pang:
Identification for Nonlinear Flow Characteristics of Main Steam Regulating Valves in Power Plants by Mining Special Data Segments. IEEE Trans. Ind. Informatics 20(5): 7915-7925 (2024) - [j86]Mubarak Umar, Jiandong Wang, Hafsa Kabir Ahmad, Shuangrui Zhao, Feng Li, Shuguang Wang, Minggang Zheng, Yulong Shen, Zhiwei Zhang, Xin Guo:
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles. Veh. Commun. 45: 100708 (2024) - [c51]Jiandong Wang, Alessandro Perelli:
End-to-End Model-Based Deep Learning for Dual-Energy Computed Tomography Material Decomposition. ISBI 2024: 1-5 - [c50]Jiandong Wang, Hongguang Zhang, Chun Liu, Xiongjun Yang:
Fake News Detection via Multi-scale Semantic Alignment and Cross-modal Attention. SIGIR 2024: 2406-2410 - [c49]Shiwei Yin, Ying Li, Jiandong Wang, Yu Kong:
Graph Transformer Hawkes Processes for Causal Structure Learning in Telecom Networks. WASA (1) 2024: 93-101 - [i3]Jiandong Wang, Alessandro Perelli:
End-to-End Model-based Deep Learning for Dual-Energy Computed Tomography Material Decomposition. CoRR abs/2406.00479 (2024) - 2023
- [j85]Wenkai Hu, Xiangxiang Zhang, Jiandong Wang, Guang Yang, Yuxin Cai:
Pattern Matching of Industrial Alarm Floods Using Word Embedding and Dynamic Time Warping. IEEE CAA J. Autom. Sinica 10(4): 1096-1098 (2023) - [j84]Jiandong Wang, Hao Liu, Xuewen Dong, Yulong Shen, Xinghui Zhu, Bin Wang, Feng Li:
Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing. IEEE Internet Things J. 10(10): 8971-8983 (2023) - [j83]Liwei Deng, Zhen Liu, Jiandong Wang, Baisong Yang:
ATT-YOLOv5-Ghost: water surface object detection in complex scenes. J. Real Time Image Process. 20(5): 97 (2023) - [j82]Liwei Deng, Jiandong Wang, Zhen Liu:
Cascaded Network Based on EfficientNet and Transformer for Deepfake Video Detection. Neural Process. Lett. 55(6): 7057-7076 (2023) - [j81]Jiandong Wang, Yahui Dong, Shuangrui Zhao, Zhiwei Zhang:
A High-Precision Vehicle Detection and Tracking Method Based on the Attention Mechanism. Sensors 23(2): 724 (2023) - [j80]Xinghui Zhu, Zijie Di, Qingsong Yao, Xuewen Dong, Jiandong Wang, Yulong Shen:
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee. IEEE Trans. Computers 72(6): 1554-1567 (2023) - [j79]Jiandong Wang, Shouchen Sun, Zhen Wang, Xuan Zhou, Poku Gyasi:
Alarm Deadband Design Based on Maximum Amplitude Deviations and Bayesian Estimation. IEEE Trans. Control. Syst. Technol. 31(4): 1941-1948 (2023) - [c48]Poku Gyasi, Jiandong Wang:
Optimal alarm trippoints and timers for avoiding false alarms *. SAFEPROCESS 2023: 1-7 - [c47]Yingmin Guo, Jiandong Wang, Xiaoyu Yao, Wei Wang:
Application of RPA-AI technology in enterprise financial intelligence. ICNC-FSKD 2023: 1-6 - [c46]Shouchen Sun, Jiandong Wang, Qingdian Sun, Changsheng Zhao:
Energy consumption rectification to remove effects of different outdoor temperatures in degree-days. ICPS 2023: 1-4 - [c45]Peng Zhang, Wenkai Hu, Weihua Cao, Min Wu, Jiandong Wang:
Bit Bounce Detection for Drilling Process Based on Multi-Feature Graph and Graph Convolutional Network. IECON 2023: 1-6 - [c44]Jiandong Wang, Xiaoliang Guo, Liujia Shi, Yingjun Tan:
Cell Electrical Measurement and Control Integrated Circuit System Design. ISAIMS 2023: 877-881 - [c43]Xin Guo, Jiandong Wang, Zhiwei Zhang, Lisheng Ma:
Failure-Aware Service Request Protection in LEO Satellite Constellation Networks. NaNA 2023: 221-225 - 2022
- [j78]Wenkai Hu, Jiandong Wang, Fan Yang, Banglei Han, Zhen Wang:
Analysis of time-varying cause-effect relations based on qualitative trends and change amplitudes. Comput. Chem. Eng. 162: 107813 (2022) - [j77]Xuanzheng Wang, Changwang Li, Chengqi Yi, Xinan Xu, Jiandong Wang, Youhui Zhang:
EcoForecast: An interpretable data-driven approach for short-term macroeconomic forecasting using N-BEATS neural network. Eng. Appl. Artif. Intell. 114: 105072 (2022) - [c42]Xinghui Zhu, Yalong Lv, Jia Liu, Xuewen Dong, Lin Li, Jiandong Wang:
A Study of Service Registration and Discovery Techniques in Microservice Architecture. NaNA 2022: 1-6 - [c41]Zewei Guo, Shuangrui Zhao, Jiandong Wang, Haipeng Lit, Yulong Shen:
Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver. NaNA 2022: 35-40 - [c40]Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. NaNA 2022: 489-494 - [d3]Jiandong Wang:
Dataset of alarm deadband design based on maximum amplitude deviations. IEEE DataPort, 2022 - [d2]Jiandong Wang:
Dataset of alarm deadband design based. IEEE DataPort, 2022 - [d1]Jiandong Wang:
Dataset of alarm deadband design based on maximum amplitude deviation. IEEE DataPort, 2022 - 2021
- [j76]Chao Zhang, Zhaodong Liu, Jiandong Wang, Zhen Wang:
Fast Fault Detection and Location System for Distribution Network Lines Based on Power Electronic Disturbance Signals. J. Circuits Syst. Comput. 30(10): 2150187:1-2150187:20 (2021) - [j75]Jiandong Wang, Zijiang Yang, Mengyao Wei, Song Gao, Yan Zhao:
Static Gain Estimation for Automatic Generation Control Systems From Historical Ramp Responses. IEEE Trans. Control. Syst. Technol. 29(4): 1831-1838 (2021) - [j74]Xianghua Wang, Chee Pin Tan, Fen Wu, Jiandong Wang:
Fault-Tolerant Attitude Control for Rigid Spacecraft Without Angular Velocity Measurements. IEEE Trans. Cybern. 51(3): 1216-1229 (2021) - [c39]Guohao Li, Jiandong Wang, Yan Xiao, Zhiyuan Zhang:
Variable time delay estimation between time series based on significant change points. CAA SAFEPROCESS 2021: 1-4 - [c38]Zhiyuan Zhang, Jiandong Wang, Guohao Li, Xiaotong Jia:
Nonlinearity model identification for main steam valves based on steady-state data. CAA SAFEPROCESS 2021: 1-6 - 2020
- [j73]Xiaotong Xing, Jiandong Wang, Zijiang Yang, Poku Gyasi:
Identification of Multiple First-Order Continuous-Time Dynamic Models From Special Segments in Historical Data. IEEE Access 8: 44879-44888 (2020) - [j72]Quanhu Sheng, Hui Yu, Olufunmilola Oyebamiji, Jiandong Wang, Danqian Chen, Scott Ness, Ying-Yong Zhao, Yan Guo:
AnnoGen: annotating genome-wide pragmatic features. Bioinform. 36(9): 2899-2901 (2020) - [j71]Zhaojuan Zhang, Wanliang Wang, Ruofan Xia, Gaofeng Pan, Jiandong Wang, Jijun Tang:
Achieving large and distant ancestral genome inference by using an improved discrete quantum-behaved particle swarm optimization algorithm. BMC Bioinform. 21(1): 516 (2020) - [j70]Weiping Ding, Jiandong Wang, Jiehua Wang:
Multigranulation consensus fuzzy-rough based attribute reduction. Knowl. Based Syst. 198: 105945 (2020) - [j69]Yizhou Xu, Jiandong Wang, Yan Yu:
Alarm Event Prediction From Historical Alarm Flood Sequences Based on Bayesian Estimators. IEEE Trans Autom. Sci. Eng. 17(2): 1070-1075 (2020) - [j68]Yan Yu, Jiandong Wang:
Alarm Monitoring for Multivariate Processes Based on a Convex-Hull Normal Operating Zone. IEEE Trans. Control. Syst. Technol. 28(6): 2649-2656 (2020) - [j67]Yan Yu, Jiandong Wang, Zijian Ouyang:
Designing Dynamic Alarm Limits and Adjusting Manipulated Variables for Multivariate Systems. IEEE Trans. Ind. Electron. 67(3): 2314-2325 (2020) - [c37]Zhen Shao, Lin Zhang, Jiandong Wang:
Uncovering the Trust Transfer Mechanisms in a Blockchain-Based Healthcare Platform: A Mixed Method. AMCIS 2020 - [c36]Jiandong Wang, Sajal Kumar, Mingzhou Song:
Joint Grid Discretization for Biological Pattern Discovery. BCB 2020: 57:1-57:10 - [c35]Zipei Li, Qianqian Huang, Chengqi Yi, Huiying Li, Mingjun Guo, Jiandong Wang:
Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors. ICNC 2020: 41-45
2010 – 2019
- 2019
- [j66]Jiandong Wang, Kuang Chen:
Selection of Root-Cause Process Variables Based on Qualitative Trends in Historical Data Samples. IEEE Access 7: 138637-138644 (2019) - [j65]Pengfei Cao, Jiandong Wang, Chao Zhang:
Steady-State Interval Detection and Nonlinear Modeling for Automatic Generation Control Systems. IEEE Access 7: 139592-139600 (2019) - [j64]Jiandong Wang, Yan Yu, Kuang Chen:
Determining the number of segments for piece-wise linear representation of discrete-time signals. Comput. Chem. Eng. 120: 46-53 (2019) - [j63]Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing. Int. J. Embed. Syst. 11(2): 115-124 (2019) - [j62]Zhen Wang, Xingzhen Bai, Jiandong Wang, Zijiang Yang:
Indexing and Designing Deadbands for Industrial Alarm Signals. IEEE Trans. Ind. Electron. 66(10): 8093-8103 (2019) - [c34]Zhen Wang, Jiandong Wang, Xingzhen Bai, Zijiang Yang:
On Industrial Alarm Deadbands for Univariate Analog Signals. CAA SAFEPROCESS 2019: 613-618 - [c33]Bing Feng, Ying-Yong Zhao, Jiexi Wang, Hui Yu, Shiva Potu, Jiandong Wang, Jijun Tang, Yan Guo:
The Application of Machine Learning Algorithms to Diagnose CKD Stages and Identify Critical Metabolites Features. IWBBIO (1) 2019: 72-83 - [c32]Zhen Shao, Zhengyuan Pan, Rui Zhao, Jiandong Wang:
Examining Individuals' Ads Click Intention in the Wechat Moments: A Lens of Elaboration Likelihood Model. PACIS 2019: 22 - [c31]Song Gao, Zening Zhao, Ting Wang, Chao Zhang, Jiandong Wang, Yingkun Han:
Performance assessment of primary frequency regulation based on static characteristics. SICE 2019: 912-916 - 2018
- [j61]Lei Fang, Jiandong Wang, Xiaobo Tan:
An incremental harmonic balance-based approach for harmonic analysis of closed-loop systems with Prandtl-Ishlinskii operator. Autom. 88: 48-56 (2018) - [j60]Jiandong Wang, Jianjun Su, Yan Zhao, Donghua Zhou:
Searching historical data segments for process identification in feedback control loops. Comput. Chem. Eng. 112: 6-16 (2018) - [j59]Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang:
Privacy preserving cloud data sharing system with flexible control. Comput. Electr. Eng. 70: 978-986 (2018) - [j58]Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Cryptogr. 86(11): 2587-2603 (2018) - [j57]Bo Sun, Haiyan Chen, Jiandong Wang, Hua Xie:
Evolutionary under-sampling based bagging ensemble method for imbalanced data classification. Frontiers Comput. Sci. 12(2): 331-350 (2018) - [j56]Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9): 10455-10469 (2018) - [j55]Juan Sui, Qiming Qin, Huazhong Ren, Yuanheng Sun, Tianyuan Zhang, Jiandong Wang, Shihong Gong:
Winter Wheat Production Estimation Based on Environmental Stress Factors from Satellite Observations. Remote. Sens. 10(6): 962 (2018) - [j54]Jiandong Wang, Yan Zhao, Zhenfu Bi:
Criteria and Algorithms for Online and Offline Detections of Industrial Alarm Floods. IEEE Trans. Control. Syst. Technol. 26(5): 1722-1731 (2018) - [j53]Weiping Ding, Chin-Teng Lin, Mukesh Prasad, Zehong Cao, Jiandong Wang:
A Layered-Coevolution-Based Attribute-Boosted Reduction Using Adaptive Quantum-Behavior PSO and Its Consistent Segmentation for Neonates Brain Tissue. IEEE Trans. Fuzzy Syst. 26(3): 1177-1191 (2018) - [j52]Wanqi Xiong, Jiandong Wang, Kuang Chen:
Multivariate Alarm Systems for Time-Varying Processes Using Bayesian Filters With Applications to Electrical Pumps. IEEE Trans. Ind. Informatics 14(2): 504-513 (2018) - 2017
- [j51]Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang:
Identity-based conditional proxy re-encryption with fine grain policy. Comput. Stand. Interfaces 52: 1-9 (2017) - [j50]Yintong Wang, Jiandong Wang, Hao Liao, Haiyan Chen:
An efficient semi-supervised representatives feature selection algorithm based on information theory. Pattern Recognit. 61: 511-523 (2017) - [j49]Yan Yu, Jiandong Wang, Zijiang Yang:
Design of Alarm Trippoints for Univariate Analog Process Variables Based on Alarm Probability Plots. IEEE Trans. Ind. Electron. 64(8): 6496-6505 (2017) - [c30]Ruobin Wang, Fengxia Li, Nannan Cheng, Bin Xiao, Jiandong Wang, Chuntao Du:
How does web-based virtual reality affect learning: evidences from a quasi-experiment. ACM TUR-C 2017: 9:1-9:7 - 2016
- [j48]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j47]Peng-Cheng Zou, Jiandong Wang, Songcan Chen, Haiyan Chen:
Margin distribution explanation on metric learning for nearest neighbor classification. Neurocomputing 177: 168-178 (2016) - [j46]Weiping Ding, Jiehua Wang, Jiandong Wang:
A hierarchical-coevolutionary-MapReduce-based knowledge reduction algorithm with robust ensemble Pareto equilibrium. Inf. Sci. 342: 153-175 (2016) - [j45]Wenhua Xu, Haiyan Chen, Yuping Zhang, Jiandong Wang:
一种基于中介真值程度度量的模糊综合评价方法 (Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree). 计算机科学 43(2): 204-209 (2016) - [j44]Bo Sun, Songcan Chen, Jiandong Wang, Haiyan Chen:
A robust multi-class AdaBoost algorithm for mislabeled noisy data. Knowl. Based Syst. 102: 87-102 (2016) - [j43]Zhengtao Liu, Jiandong Wang:
A fine-grained context-aware access control model for health care and life science linked data. Multim. Tools Appl. 75(22): 14263-14280 (2016) - [j42]Jiandong Wang, Fan Yang, Tongwen Chen, Sirish L. Shah:
An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems. IEEE Trans Autom. Sci. Eng. 13(2): 1045-1061 (2016) - [j41]Li Tang, Jiandong Wang:
Estimation of the Most Critical Parameter for the Two-Movement Method to Compensate for Oscillations Caused by Control Valve Stiction. IEEE Trans. Control. Syst. Technol. 24(5): 1869-1874 (2016) - [c29]Lei Fang, Jiandong Wang, Xiaobo Tan, Qunli Shang:
Analysis and compensation of control valve stiction-induced limit cycles. AIM 2016: 1688-1693 - [c28]Lei Fang, Jiandong Wang, Xiaobo Tan:
Frequency response analysis for closed-loop systems with hysteresis using incremental harmonic balance. ACC 2016: 1305-1310 - [c27]Xia Zhang, Zhengyou Xia, Jiandong Wang:
Local Community Detection Based on Bridges Ideas. DMBD 2016: 409-415 - 2015
- [j40]Wenkai Hu, Jiandong Wang, Tongwen Chen:
A new method to detect and quantify correlated alarms with occurrence delays. Comput. Chem. Eng. 80: 189-198 (2015) - [j39]Yintong Wang, Jiandong Wang, Haiyan Chen, Bo Sun:
Semi-Supervised Local Fisher Discriminant Analysis Based on Reconstruction Probability Class. Int. J. Pattern Recognit. Artif. Intell. 29(2): 1550007:1-1550007:17 (2015) - [j38]Weiping Ding, Zhijin Guan, Quan Shi, Jiandong Wang:
A more efficient attribute self-adaptive co-evolutionary reduction algorithm by combining quantum elitist frogs and cloud model operators. Inf. Sci. 293: 214-234 (2015) - [j37]Liming Fang, Zhiqiu Huang, Jiandong Wang:
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model). 计算机科学 42(11): 197-202 (2015) - [j36]Bo Sun, Haiyan Chen, Jiandong Wang:
An empirical margin explanation for the effectiveness of DECORATE ensemble learning algorithm. Knowl. Based Syst. 78: 1-12 (2015) - [j35]Jiandong Wang, Qinghua Zhang:
Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method. IEEE Trans. Autom. Control. 60(5): 1439-1444 (2015) - [c26]Haiyan Chen, Jiajia Deng, Bo Sun, Jiandong Wang:
An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR. ICCCS 2015: 536-549 - 2014
- [j34]Jiandong Wang, Tongwen Chen:
An online method to remove chattering and repeating alarms based on alarm durations and intervals. Comput. Chem. Eng. 67: 43-52 (2014) - [j33]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
An FAR-SW based approach for webpage information extraction. Inf. Syst. Frontiers 16(5): 771-785 (2014) - [j32]Peng-Cheng Zou, Jiandong Wang, Songcan Chen, Haiyan Chen:
Bagging-like metric learning for support vector regression. Knowl. Based Syst. 65: 21-30 (2014) - [c25]Hong Song, Qian Zhang, Feifei Sun, Jiandong Wang, Quansheng Wang, Jingdan Qiu, Deqiang Kou:
Breast tissue segmentation on MR images using KFCM with spatial constraints. GrC 2014: 254-258 - [c24]Lin Lin, Chengfeng Yang, Jiandong Wang, Shiwei Ma:
Evaluation of digital baseband modulation schemes for molecular communication in nanonetworks. ICUFN 2014: 297-302 - 2013
- [j31]Jiandong Wang, Tongwen Chen:
An online method for detection and reduction of chattering alarms due to oscillation. Comput. Chem. Eng. 54: 140-150 (2013) - [j30]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Fuzzy conditional proxy re-encryption. Sci. China Inf. Sci. 56(5): 1-13 (2013) - [j29]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238: 221-241 (2013) - [j28]Zhengtao Liu, Jiandong Wang:
Principles and Model for Web Dataspace. J. Comput. 8(4): 998-1005 (2013) - [j27]Zhan Bu, Zhengyou Xia, Jiandong Wang:
A sock puppet detection algorithm on virtual spaces. Knowl. Based Syst. 37: 366-377 (2013) - [j26]Weiping Ding, Jiandong Wang:
A novel approach to minimum attribute reduction based on quantum-inspired self-adaptive cooperative co-evolution. Knowl. Based Syst. 50: 1-13 (2013) - [j25]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network. Knowl. Based Syst. 50: 246-259 (2013) - [j24]Zijiang Yang, Jiandong Wang, Tongwen Chen:
Detection of Correlated Alarms Based on Similarity Coefficients of Binary Data. IEEE Trans Autom. Sci. Eng. 10(4): 1014-1025 (2013) - [c23]Weiping Ding, Quan Shi, Senbo Chen, Zhijin Guan, Jiandong Wang:
A novel quantum cooperative co-evolutionary algorithm for large-scale minimum attribute reduction optimization. CIDM 2013: 280-286 - [c22]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
Current Attitude Prediction Model Based on Game Theory. WISE (2) 2013: 469-478 - 2012
- [j23]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Hierarchical conditional proxy re-encryption. Comput. Stand. Interfaces 34(4): 380-389 (2012) - [j22]Lina Wang, Jiandong Wang:
Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets. Int. J. Pattern Recognit. Artif. Intell. 26(4) (2012) - [j21]Haiyan Chen, Jiandong Wang, Lirong Feng:
Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction. J. Softw. 7(2): 263-268 (2012) - [j20]Bin Gu, Jiandong Wang, Yuecheng Yu, Guansheng Zheng, Yufan Huang, Tao Xu:
Accurate on-line v-support vector learning. Neural Networks 27: 51-59 (2012) - [j19]Jianwei Xu, Jiandong Wang, Iman Izadi, Tongwen Chen:
Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD. IEEE Trans Autom. Sci. Eng. 9(2): 296-307 (2012) - [j18]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 462: 39-58 (2012) - [j17]Bin Gu, Jiandong Wang, Guansheng Zheng, Yuecheng Yu:
Regularization Path for ν-Support Vector Classification. IEEE Trans. Neural Networks Learn. Syst. 23(5): 800-811 (2012) - 2011
- [j16]Feng Pan, Jiandong Wang, Xiaohui Lin:
Local margin based semi-supervised discriminant embedding for visual recognition. Neurocomputing 74(5): 812-819 (2011) - [j15]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. J. Syst. Softw. 84(12): 2293-2302 (2011) - [c21]Wenshui Lin, Jinping Xu, Jiandong Wang, Xinyou Wu:
A Bricklaying Best-Fit Heuristic Algorithm for the Orthogonal Rectangle Packing Problem. ICAIC (2) 2011: 638-643 - [c20]Jiandong Wang, Xinhu Wang:
Elasto-plastic Collapse Strength Calculation of Casing under Pure External Pressure. ICDMA 2011: 498-501 - 2010
- [j14]Chunyun Yan, Jiandong Wang, Qinghua Zhang:
Subspace identification methods for Hammerstein systems: rank constraint and dimension problem. Int. J. Control 83(11): 2204-2216 (2010) - [j13]Bin Gu, Jiandong Wang, Tao Li:
Ordinal-Class Core Vector Machine. J. Comput. Sci. Technol. 25(4): 699-708 (2010) - [j12]Yao Rong, Jiandong Wang:
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform. J. Digit. Content Technol. its Appl. 4(9): 68-79 (2010) - [j11]Xin-feng Zhu, Jiandong Wang, Bin Li:
Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals. J. Digit. Content Technol. its Appl. 4(9): 123-131 (2010) - [j10]Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu:
Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning. J. Digit. Content Technol. its Appl. 4(9): 132-140 (2010) - [j9]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Decryptable Public Key Encryption with Keyword Search Schemes. J. Digit. Content Technol. its Appl. 4(9): 141-150 (2010) - [j8]Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. J. Digit. Content Technol. its Appl. 4(9): 151-160 (2010) - [c19]Jianwei Xu, Jiandong Wang:
Averaged alarm delay and systematic design for alarm systems. CDC 2010: 6821-6826 - [c18]Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480
2000 – 2009
- 2009
- [j7]Jiandong Wang, Qinghua Zhang, Lennart Ljung:
Revisiting Hammerstein system identification through the Two-Stage Algorithm for bilinear parameter estimation. Autom. 45(11): 2627-2633 (2009) - [j6]Jiandong Wang, Wei Xing Zheng, Tongwen Chen:
Identification of linear dynamic systems operating in a networked environment. Autom. 45(12): 2763-2772 (2009) - [j5]Jiandong Wang, Akira Sano, Tongwen Chen, Biao Huang:
Identification of Hammerstein systems without explicit parameterisation of non-linearity. Int. J. Control 82(5): 937-952 (2009) - [j4]Junwu Zhu, Jiandong Wang, Bin Li:
A formal method for integrating distributed ontologies and reducing the redundant relations. Kybernetes 38(10): 1870-1879 (2009) - [c17]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258 - [c16]Jiandong Wang, Wei Xing Zheng, Tongwen Chen:
On system identification in a networked environment. CDC 2009: 2610-2615 - [c15]Jiandong Wang, Qinghua Zhang, Lennart Ljung:
Revisiting the Two-Stage Algorithm for Hammerstein system identification. CDC 2009: 3620-3625 - [c14]Zhigang Zhai, Jiandong Wang, Yuguang Mao:
Study and Safety Analysis on UCONonA Model. DBTA 2009: 103-106 - [c13]Jiandong Wang, Yingke Xie, Chao Zhu, Zili Zhao, Chengde Han:
An Embedded Load Balancing System for High Speed OC192 Networks. ICESS 2009: 587-592 - [c12]Liming Fang, Willy Susilo, Jiandong Wang:
Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60 - 2008
- [c11]Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu:
Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239 - [c10]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. CIS (1) 2008: 326-330 - [c9]Haiyan Chen, Jiandong Wang, Xuefeng Yan:
A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning. FSKD (3) 2008: 331-335 - [c8]Bin Gu, Jiandong Wang, Haiyan Chen:
On-line off-line Ranking Support Vector Machine and analysis. IJCNN 2008: 1364-1369 - [i2]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptol. ePrint Arch. 2008: 139 (2008) - [i1]Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian:
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2008: 479 (2008) - 2007
- [j3]Jiandong Wang, Akira Sano, David S. Shook, Tongwen Chen, Biao Huang:
A blind approach to closed-loop identification of Hammerstein systems. Int. J. Control 80(2): 302-313 (2007) - [c7]Jiandong Wang, Akira Sano, Tongwen Chen, Biao Huang:
Blind Hammerstein Identification for MR Damper Modeling. ACC 2007: 2277-2282 - [c6]Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:
Identity-Based Key Issuing Protocol for Ad Hoc Networks. CIS 2007: 917-921 - [c5]Junwu Zhu, Jiandong Wang, Bin Li:
On Dynamic and Concurrent Model of Web Service Components. CSCWD 2007: 568-572 - [c4]Junwu Zhu, Jiandong Wang, Bin Li:
SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System. CSCWD 2007: 573-576 - 2006
- [j2]Jiandong Wang, Tongwen Chen, Biao Huang:
Cyclo-period estimation for discrete-time cyclo-stationary signals. IEEE Trans. Signal Process. 54(1): 83-94 (2006) - [c3]Junwu Zhu, Jiandong Wang, Li Bin, Jiang Yi:
On Semantic-based cooperation among Web Services. CSCWD 2006: 700-703 - 2005
- [j1]Jiandong Wang, Tongwen Chen, Biao Huang:
On spectral theory of cyclostationary signals in multirate systems. IEEE Trans. Signal Process. 53(7): 2421-2431 (2005) - [c2]Feiyue Ye, Jiandong Wang, Shiliang Wu, Huiping Chen, Tianqiang Huang, Li Tao:
An Integrated Approach for Mining Meta-rules. MLDM 2005: 549-557
1990 – 1999
- 1991
- [c1]Sylvain Delisle, Stan Matwin, Jiandong Wang, Lionel Zupan:
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts. ISMIS 1991: 326-337
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint