Jia Xu
According to our database1,
Jia Xu
authored at least 175 papers
between 1990 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2019
Passive Attacks Against Searchable Encryption.
IEEE Trans. Information Forensics and Security, 2019
Model Predictive Control for Stochastic Max-Plus Linear Systems With Chance Constraints.
IEEE Trans. Automat. Contr., 2019
2018
Wind Turbine Blade Breakage Monitoring With Deep Autoencoders.
IEEE Trans. Smart Grid, 2018
WCS: Weighted Component Stitching for Sparse Network Localization.
IEEE/ACM Trans. Netw., 2018
Soil Moisture Retrieval From SMAP: A Validation and Error Analysis Study Using Ground-Based Observations Over the Little Washita Watershed.
IEEE Trans. Geoscience and Remote Sensing, 2018
Soil Moisture Mapping from Satellites: An Intercomparison of SMAP, SMOS, FY3B, AMSR2, and ESA CCI over Two Dense Network Regions at Different Spatial Scales.
Remote Sensing, 2018
Estimating the crisis information coverage model in the internet communities.
Kybernetes, 2018
Semi-supervised multi-graph classification using optimal feature selection and extreme learning machine.
Neurocomputing, 2018
An Efficient Scheduling Scheme for XMP and DCTCP Mixed Flows in Commodity Data Centers.
IEEE Communications Letters, 2018
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
IACR Cryptology ePrint Archive, 2018
Super-Graph Classification Based on Composite Subgraph Features and Extreme Learning Machine.
Cognitive Computation, 2018
Hunter NMT System for WMT18 Biomedical Translation Task: Transfer Learning in Neural Machine Translation.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018
Vine Copula-Based Asymmetry and Tail Dependence Modeling.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Handling Process Overruns and Underruns on Multiprocessors in a Fault-Tolerant Real-Time Embedded System.
Proceedings of the 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications, 2018
Personality Trait Prediction Based on 2.5D Face Feature Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Learning to See in the Dark.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Assessing Quality Estimation Models for Sentence-Level Prediction.
Proceedings of the 27th International Conference on Computational Linguistics, 2018
2017
Wind Turbine Gearbox Failure Identification With Deep Neural Networks.
IEEE Trans. Industrial Informatics, 2017
Efficient Data Collection in Widely Distributed Wireless Sensor Networks with Time Window and Precedence Constraints.
Sensors, 2017
Satellite-Derived Spatiotemporal Variations in Evapotranspiration over Northeast China during 1982-2010.
Remote Sensing, 2017
MODIS-Based Estimation of Terrestrial Latent Heat Flux over North America Using Three Machine Learning Algorithms.
Remote Sensing, 2017
Surface Motion and Structural Instability Monitoring of Ming Dynasty City Walls by Two-Step Tomo-PSInSAR Approach in Nanjing City, China.
Remote Sensing, 2017
Differentially Private Event Histogram Publication on Sequences over Graphs.
J. Comput. Sci. Technol., 2017
Vehicle scheduling based on variable trip times with expected on-time performance.
ITOR, 2017
Parallel multi-graph classification using extreme learning machine and MapReduce.
Neurocomputing, 2017
Geo-Hazard Detection and Monitoring Using SAR and Optical Images in a Snow-Covered Area: The Menyuan (China) Test Site.
ISPRS Int. J. Geo-Information, 2017
A New Functional Encryption for Multidimensional Range Query.
IACR Cryptology ePrint Archive, 2017
A practical M x N search routing in mobile opportunistic networks.
Comput. Syst. Sci. Eng., 2017
Network module-based model in the differential expression analysis for RNA-seq.
Bioinformatics, 2017
Hunter MT: A Course for Young Researchers in WMT17.
Proceedings of the Second Conference on Machine Translation, 2017
Towards Efficient Multimedia Data Disseminating in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
The approach of SWIM data sharing based on multi-dimensional data encryption.
Proceedings of the 25th International Conference on Software, 2017
Parallelization of Conjunctive Query Answering over Ontologies.
Proceedings of the Information Management and Big Data, 2017
Parallelization of Query Processing over Expressive Ontologies.
Proceedings of the 4th Annual International Symposium on Information Management and Big Data, 2017
Delay updating in Software-Defined Datacenter networks.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Topology calibration in data centers.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Fast Image Processing with Fully-Convolutional Networks.
Proceedings of the IEEE International Conference on Computer Vision, 2017
Effects of respiration depth on human body radar cross section Using 2.4GHz continuous wave radar.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017
Copula-Based High Dimensional Cross-Market Dependence Modeling.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
Accurate Optical Flow via Direct Cost Volume Processing.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017
A Negotiation-Based Collision Avoidance Scheme for Autonomous Mobile Robots.
Proceedings of the Communications and Networking, 2017
Efficient Online Model Adaptation by Incremental Simplex Tableau.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
Caching-Aware Techniques for Query Workload Partitioning in Parallel Search Engines.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
CATS: Cooperative Allocation of Tasks and Scheduling of Sampling Intervals for Maximizing Data Sharing in WSNs.
TOSN, 2016
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.
Sensors, 2016
Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks.
J. Sensors, 2016
Public transit planning and scheduling based on AVL data in China.
ITOR, 2016
Optimistic optimization for model predictive control of max-plus linear systems.
Automatica, 2016
Receding-horizon control for max-plus linear systems with discrete actions using optimistic planning.
Proceedings of the 13th International Workshop on Discrete Event Systems, 2016
Explore K-Anycast information dissemination in mobile opportunistic networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Cyber and Physical Access Control in Legacy System Using Passwords.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
TaxiCast: Efficient Broadcasting of Multimedia Advertisements in Vehicular Ad-Hoc Networks.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
On the Power and Limits of Distance-Based Learning.
Proceedings of the 33nd International Conference on Machine Learning, 2016
Efficient similarity join based on Earth Mover's Distance using MapReduce.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Infrared Image Recognition of Bushing Type Cable Terminal Based on Radon and Fourier-Mellin Transform and BP Neural Network.
Proceedings of the Fuzzy Systems and Data Mining II, 2016
Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016
Synchrosqueezing an effective method for analyzing Doppler radar physiological signals.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
Wrist-worn heartbeat monitoring system based on bio-impedance analysis.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
Enhancing TPM Security by Integrating SRAM PUFs Technology.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
EMD-DSJoin: Efficient Similarity Join Over Probabilistic Data Streams Based on Earth Mover's Distance.
Proceedings of the Web Technologies and Applications, 2016
Mining user interests from social media by fusing textual and visual features.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016
Model predictive control for continuous piecewise affine systems using optimistic optimization.
Proceedings of the 2016 American Control Conference, 2016
Limited Intervention Collaborative Decision Making of MAV-UAV Team Based on VFCM.
Proceedings of the IEEE International Conference on Services Computing, 2016
2015
Data-Driven Wind Turbine Power Generation Performance Monitoring.
IEEE Trans. Industrial Electronics, 2015
Online scheduling with equal processing times and machine eligibility constraints.
Theor. Comput. Sci., 2015
On Subgradient Projectors.
SIAM Journal on Optimization, 2015
Improving schedulability and energy efficiency for window-constrained real-time systems with reliability requirement.
Journal of Systems Architecture - Embedded Systems Design, 2015
Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation.
J. Sensors, 2015
On the Finite Convergence of a Projected Cutter Method.
J. Optimization Theory and Applications, 2015
Public engagement with firms on social media in China.
J. Information Science, 2015
Designing Constrained Trajectory Based on Maximizing Energy Reduction in Large-Scale Wireless Sensor Networks.
IJDSN, 2015
A Chaotic Particle Swarm Optimization-Based Heuristic for Market-Oriented Task-Level Scheduling in Cloud Workflow Systems.
Comp. Int. and Neurosc., 2015
Joint number and DOA estimation via the eigen-beam mCapon method for closely spaced sources.
SCIENCE CHINA Information Sciences, 2015
Extreme learning machines: new trends and applications.
SCIENCE CHINA Information Sciences, 2015
Graduate enrollment prediction by an Error Back Propagation algorithm based on the Multi-Experiential Particle Swarm Optimization.
Proceedings of the 11th International Conference on Natural Computation, 2015
Manifold-valued Dirichlet Processes.
Proceedings of the 32nd International Conference on Machine Learning, 2015
Estimation of physiological sub-millimeter displacement with CW Doppler radar.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015
Document similarity analysis via involving both explicit and implicit semantic couplings.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015
Learning to segment under various forms of weak supervision.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015
Gaze-enabled egocentric video summarization via constrained submodular maximization.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015
2014
Design of micro-optics array to realize two dimensional perfect shuffle transform.
Optical Switching and Networking, 2014
The Security Evaluation of ATM Information System Based on Bayesian Regularization.
JSW, 2014
Efficient Multicast Routing on BCube-Based Data Centers.
TIIS, 2014
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptology ePrint Archive, 2014
Optimizing the most specific concept method for efficient instance checking.
Proceedings of the 23rd International World Wide Web Conference, 2014
Model Predictive Control for Max-Plus-Linear Systems Via Optimistic Optimization.
Proceedings of the 12th International Workshop on Discrete Event Systems, 2014
Data folding: A new data soft destruction algorithm.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014
Efficient Graph Similarity Join with Scalable Prefix-Filtering Using MapReduce.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Mirror Data to the Ceiling: A New Completely Wireless Data Center.
Proceedings of the Frontiers in Internet Technologies, 2014
Joint Visual and Textual Mining on Social Media.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014
Spectral Clustering with a Convex Regularizer on Millions of Images.
Proceedings of the Computer Vision - ECCV 2014, 2014
Tell Me What You See and I Will Show You Where It Is.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014
Query Lattice for Translation Retrieval.
Proceedings of the COLING 2014, 2014
An ant colony optimization method to detect communities in social networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014
A dynamic taint tracking based method to detect sensitive information leaking.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
Proceedings of the Applied Cryptography and Network Security, 2014
Converting Instance Checking to Subsumption: A Rethink for Object Queries over Practical Ontologies.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
Bagging by Design (on the Suboptimality of Bagging).
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
2013
Differentially private histogram publication.
VLDB J., 2013
Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013
Finite-time stability of nonlinear switched impulsive systems.
Int. J. Systems Science, 2013
Optimal Joint Expected Delay Forwarding in Delay Tolerant Networks.
IJDSN, 2013
A Data Transmission Scheme Based on Time-Evolving Meeting Probability for Opportunistic Social Network.
IJDSN, 2013
A Sociability-Based Spray and Forward Scheme for Opportunistic Network.
IJDSN, 2013
Existence and nonexistence of positive solutions for nonlocal problems with inhomogeneous strong Allee effect.
Applied Mathematics and Computation, 2013
Salient object detection in image sequences via spatial-temporal cue.
Proceedings of the 2013 Visual Communications and Image Processing, 2013
A Comprehensive Access Control System for Scientific Applications.
Proceedings of the Network and System Security - 7th International Conference, 2013
CRIS - Computational research infrastructure for science.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
GOSUS: Grassmannian Online Subspace Updates with Structured-Sparsity.
Proceedings of the IEEE International Conference on Computer Vision, 2013
Incorporating User Interaction and Topological Constraints within Contour Completion via Discrete Calculus.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Efficient and effective similarity search over probabilistic data based on Earth Mover's Distance.
VLDB J., 2012
Finite-time filtering for discrete-time linear impulsive systems.
Signal Processing, 2012
Multicast Service-Oriented Virtual Network Embedding in Wireless Mesh Networks.
IEEE Communications Letters, 2012
Global structure of positive solutions for superlinear second-order periodic boundary value problems.
Applied Mathematics and Computation, 2012
Adaptive Update Workload Reduction for Moving Objects in Road Networks.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012
Improving schedulability and energy performance for weakly hard real-time systems.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Differentially Private Histogram Publication.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
EUDEMON: A System for Online Video Frame Copy Detection by Earth Mover's Distance.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Improvement of LEACH protocol for WSN.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
An improved iterative channel estimation based LTE Downlink.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Analyzing the Subspace Structure of Related Images: Concurrent Segmentation of Image Sets.
Proceedings of the Computer Vision - ECCV 2012, 2012
Energy-Efficient Multi-hop Routing Algorithm Based on LEACH.
Proceedings of the Advances in Wireless Sensor Networks, 2012
A Survey on Event Processing for CPS.
Proceedings of the Advances in Wireless Sensor Networks, 2012
Random walks based multi-image segmentation: Quasiconvexity results and GPU-based solutions.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012
Towards efficient proofs of retrievability.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
A New Balancing Type of Wireless Sensor Network Routing Algorithm.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012
2011
Towards Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2011
Practically Efficient Proof of Retrievability in Cloud Storage.
IACR Cryptology ePrint Archive, 2011
Secure Cloud Storage with Encrypted Data using File-Based Authentication.
IACR Cryptology ePrint Archive, 2011
Practically Efficient Verifiable Delegation of Polynomial and its Applications.
IACR Cryptology ePrint Archive, 2011
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage.
IACR Cryptology ePrint Archive, 2011
ID Repetition in Structured P2P Networks.
Comput. J., 2011
Bifurcation techniques and positive solutions of discrete Lidstone boundary value problems.
Applied Mathematics and Computation, 2011
DFKI Hybrid Machine Translation System for WMT 2011 - On the Integration of SMT and RBMT.
Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011
A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Enhancing Chinese Word Segmentation Using Unlabeled Data.
Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, 2011
The application research of parametric design in de-airing pug press.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
Efficient and Effective Similarity Search over Probabilistic Data based on Earth Mover's Distance.
PVLDB, 2010
Authenticating Aggregate Range Queries over Multidimensional Dataset.
IACR Cryptology ePrint Archive, 2010
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem.
IACR Cryptology ePrint Archive, 2010
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset.
IACR Cryptology ePrint Archive, 2010
Model and analysis of path compression for mobile Ad Hoc networks.
Computers & Electrical Engineering, 2010
Bifurcation from interval and positive solutions for second order periodic boundary value problems.
Applied Mathematics and Computation, 2010
Further Experiments with Shallow Hybrid MT Systems.
Proceedings of the Joint Fifth Workshop on Statistical Machine Translation and MetricsMATR, 2010
A chameleon encryption scheme resistant to known-plaintext attack.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
On Directed Transitive Signature.
IACR Cryptology ePrint Archive, 2009
ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009
Research on the Maintenance Decision-Making of Cement Concrete Pavement Based on Preventive Maintenance.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
Short Redactable Signatures Using Random Trees.
Proceedings of the Topics in Cryptology, 2009
Application on Rotor Vibration Control of SMA Model Based on Multivariate Statistical Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Improved Identification of Differentially Expressed Genes Using Pareto Gene Pruning.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009
2008
An adaptive clustering routing transition protocol in ad hoc networks.
Computer Communications, 2008
Modeling and Service Capability Evaluation for RFID Complex Event Processing.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Nonlinear Dynamic Characteristics of Traffic Flow based on Continuous Car-following Model with Nonintegral Exponent.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Research on Optimal Control of Vehicle Vibration Based on Semi-Active Suspension System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Optimizing Mechanism for a Polymorphic Tracked Robot.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008
Remote Integrity Check with Dishonest Storage Server.
Proceedings of the Computer Security, 2008
Phrase Table Training for Precision and Recall: What Makes a Good Phrase and a Good Phrase Pair?
Proceedings of the ACL 2008, 2008
2007
A software architecture for real-time embedded systems based on pre-run-time scheduling.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2006
HOPI: A Novel High Order Parametric Interpolation in 2D.
Proceedings of the Eurographics 2006, 2006
2005
Chinese Question Answering using the DLT System at NTCIR 2005.
Proceedings of the Fifth NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2005
2004
Understanding Aspects via Implicit Invocation.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004
2003
On Inspection and Verification of Software with Timing Requirements.
IEEE Trans. Software Eng., 2003
Making Software Timing Properties Easier to Inspect and Verify.
IEEE Software, 2003
2000
Priority Scheduling Versus Pre-Run-Time Scheduling.
Real-Time Systems, 2000
1993
Correction to "On Satisfying Timing Constraints in Hard-Real-Time Systems''.
IEEE Trans. Software Eng., 1993
On Satisfying Timing Constraints in Hard-Real-Time Systems.
IEEE Trans. Software Eng., 1993
Multiprocessor Scheduling of Processes with Release Times, Deadlines, Precedence, and Exclusion Relations.
IEEE Trans. Software Eng., 1993
1990
Scheduling Processes with Release Times, Deadlines, Precedence, and Exclusion Relations.
IEEE Trans. Software Eng., 1990