Jiabin Yuan

According to our database1, Jiabin Yuan authored at least 34 papers between 2013 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
QoS-aware flow scheduling for energy-efficient cloud data centre network.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and Face.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Review of studies on target acquisition in virtual reality based on the crossing paradigm.
Virtual Real. Intell. Hardw., 2019

Description generation of open-domain videos incorporating multimodal features and bidirectional encoder.
Vis. Comput., 2019

Active Data Replica Recovery for Quality-Assurance Big Data Analysis in IC-IoT.
IEEE Access, 2019

Adaptive Phone Orientation Method for Continuous Authentication Based on Mobile Motion Sensors.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Automatic 2D-to-3D Video Conversion using 3D Densely Connected Convolutional Networks.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

ECPNet: An Efficient Attention-Based Convolution Network with Pseudo-3D Block for Human Action Recognition.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Crossing-Based Selection with Virtual Reality Head-Mounted Displays.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things.
Secur. Commun. Networks, 2018

Discrete-time quantum walk on the Cayley graph of the dihedral group.
Quantum Inf. Process., 2018

Energy-Efficiency Maximization with Non-linear Fractional Programming for Intelligent Device-to-Device Communications.
Mob. Networks Appl., 2018

隐含子群问题的研究现状 (Survey on Hidden Subgroup Problem).
计算机科学, 2018

Independent set conditions for all fractional (g, f, n′, m)-critical deleted NFV networks.
J. Intell. Fuzzy Syst., 2018

Graph-based feasibility analysis of resource dispatching in NFV networks.
J. Intell. Fuzzy Syst., 2018

Differences and Similarities between Dominant and Non-dominant Thumbs for Pointing and Gesturing Tasks with Bimanual Tablet Gripping Interaction.
Interact. Comput., 2018

Optimization Algorithms for Multiaccess Green Communications in Internet of Things.
IEEE Internet Things J., 2018

An estimated Hungarian method for data forwarding problem in underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

A Novel Part-Based Model for Fine-Grained Vehicle Recognition.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Attention-Based Bidirectional Recurrent Neural Networks for Description Generation of Videos.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Distancer: A Host-Based Distributed Adaptive Load Balancer for Datacenter Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A DVFS Based Energy-Efficient Tasks Scheduling in a Data Center.
IEEE Access, 2017

Multi-output LSSVM-Based Forecasting Model for Mid-Term Interval Load Optimized by SOA and Fresh Degree Function.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017

A Robust Object Tracking Method Based on CamShift for UAV Videos.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017

Trajectory-Pooled Deep Convolutional Networks for Violence Detection in Videos.
Proceedings of the Computer Vision Systems - 11th International Conference, 2017

A New Universal Quantum Gates and Its Simulation on GPGPU.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Quantum Computer Simulation on GPU Cluster Incorporating Data Locality.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
LS-SVM-Based Prediction Model of Tread Wear Optimized by PSO-GA-LM.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Real-Time Aircraft Noise Detection Based on Large-Scale Noise Data.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Total Power Minimization for High Rate Communication in Multi-channel Multi-user Wireless Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Parallel Processing of SAR Imaging Algorithms for Large Areas Using Multi-GPU.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Quantum Computer Simulation on Multi-GPU Incorporating Data Locality.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Workflow of the Grover algorithm simulation incorporating CUDA and GPGPU.
Comput. Phys. Commun., 2013


  Loading...