default search action
Jiaqing Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Jiaqing Luo, Ruiyu Bai, Suining He, Kang G. Shin:
Pervasive Pose Estimation for Fall Detection. ACM Trans. Comput. Heal. 3(3): 27:1-27:23 (2022) - 2021
- [j13]Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021)
2010 – 2019
- 2019
- [c18]Jiaqing Luo, Kang G. Shin:
Detecting Misplaced RFID Tags on Static Shelved Items. MobiSys 2019: 378-390 - [c17]Jiaqing Luo, Kang G. Shin:
Detection of Misplaced Stationary RFID Tags. MobiSys 2019: 566-567 - 2018
- [j12]Jinkai Liu, Yanqing Qiu, Kezhao Yin, Wentong Dong, Jiaqing Luo:
RILS: RFID indoor localization system using mobile readers. Int. J. Distributed Sens. Networks 14(4) (2018) - [i1]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018) - 2016
- [j11]Yanghong Zhou, Shijie Zhou, Jiaqing Luo:
Explore city dynamics from the communication network between base stations. Int. J. Embed. Syst. 8(1): 87-92 (2016) - [c16]Tengyuan Cai, Hongrong Cheng, Jiaqing Luo, Shijie Zhou:
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation. ER 2016: 248-259 - 2015
- [j10]Zhu Song, Shijie Zhou, Jiaqing Luo, Weiwei Deng:
The B+-tree-based method for nearest neighbour queries in traffic simulation systems. Int. J. High Perform. Comput. Netw. 8(2): 110-123 (2015) - [j9]Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, Minyu Weng:
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems. IEEE Trans. Ind. Informatics 11(6): 1255-1266 (2015) - [c15]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c14]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c13]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2014
- [j8]Shijie Zhou, Jiaqing Luo:
A general approach for the intensive RFID reader deployment. Int. J. Ad Hoc Ubiquitous Comput. 16(3): 206-215 (2014) - [j7]Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, Minyi Guo:
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks. ACM Trans. Auton. Adapt. Syst. 9(1): 5:1-5:17 (2014) - [c12]Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang:
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems. MASS 2014: 416-424 - [c11]Yuping Zhao, Shijie Zhou, Jiaqing Luo, Zhu Song:
The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation. PACIS 2014: 179 - [c10]Mantun Chen, Shijie Zhou, Jiaqing Luo, Zhu Song:
An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System. PACIS 2014: 184 - 2013
- [j6]Jiaqing Luo, Bin Xiao, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j5]Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 429-439 (2013) - [j4]Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c9]Shijie Zhou, Yun Liu, Jiaqing Luo:
A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space. MSN 2013: 115-120 - [c8]Lijun Sun, Shijie Zhou, Jiaqing Luo, Yuehan Zhang, Mengjie Zhang, Weiwei Deng:
ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking. MSN 2013: 248-253 - 2012
- [j3]Jinshan Liu, Jiaqing Luo:
Research on Tax Transfer inside China's Different Regions by Using a Statistical Analysis Method. Int. J. Asian Bus. Inf. Manag. 3(3): 9-18 (2012) - 2011
- [j2]Sheng Yu, Shijie Zhou, Leyuan Liu, Rui Yang, Jiaqing Luo:
Detecting Malware Variants by Byte Frequency. J. Networks 6(4): 638-645 (2011) - [c7]Guobin Liu, Jiaqing Luo, Qingjun Xiao, Bin Xiao:
EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks. ICC 2011: 1-5 - 2010
- [c6]Jiaqing Luo, Bin Xiao, Zirong Yang, Shijie Zhou:
A clone of social networks to decentralized bootstrapping P2P networks. IWQoS 2010: 1-2
2000 – 2009
- 2009
- [j1]Yong Tang, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Concept, Characteristics and Defending Mechanism of Worms. IEICE Trans. Inf. Syst. 92-D(5): 799-809 (2009) - [c5]Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou:
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. IPDPS 2009: 1-8 - [c4]Qingjun Xiao, Bin Xiao, Jiaqing Luo, Guobin Liu:
Reliable navigation of mobile sensors in wireless sensor networks without localization service. IWQoS 2009: 1-9 - 2007
- [c3]Chunjiang Wu, Shijie Zhou, Linna Wei, Jiaqing Luo, Yanli Wang, Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems. ICA3PP 2007: 391-402 - 2006
- [c2]Jiaqing Luo, Shijie Zhou, Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks. IAT Workshops 2006: 467-470 - [c1]Xucheng Luo, Zhiguang Qin, Ji Geng, Jiaqing Luo:
IAC: Interest-Aware Caching for Unstructured P2P. SKG 2006: 58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint