Jiahui Wu

Orcid: 0000-0001-6758-4635

According to our database1, Jiahui Wu authored at least 73 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Local attention and long-distance interaction of rPPG for deepfake detection.
Vis. Comput., February, 2024

DeepSIM: a novel deep learning method for graph similarity computation.
Soft Comput., January, 2024

Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario.
Neural Comput. Appl., January, 2024

Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems.
Comput. J., January, 2024

An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024

On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing".
IEEE Trans. Inf. Forensics Secur., 2024

Random-coupled Neural Network.
CoRR, 2024

Reality Bites: Assessing the Realism of Driving Scenarios with Large Language Models.
CoRR, 2024

2023
DeepCAC: a deep learning approach on DNA transcription factors classification based on multi-head self-attention and concatenate convolutional neural network.
BMC Bioinform., December, 2023

Multi-Party Quantum Private Comparison Based on Bell States.
Entropy, August, 2023

Auditing the fairness of place-based crime prediction models implemented with deep learning approaches.
Comput. Environ. Urban Syst., June, 2023

Resilient Bipartite Consensus of Second-Order Multiagent Systems With Event-Triggered Communication.
IEEE Syst. J., March, 2023

Secure and Efficient Data Deduplication in JointCloud Storage.
IEEE Trans. Cloud Comput., 2023

A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023

Real-Time Vehicle Detection from UAV Aerial Images Based on Improved YOLOv5.
Sensors, 2023

YOLO for Penguin Detection and Counting Based on Remote Sensing Images.
Remote. Sens., 2023

Uncertainty-Aware Test Prioritization: Approaches and Empirical Evaluation.
CoRR, 2023

ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning.
CoRR, 2023

Dynamic Optimization of Rotor-Side PI Controller Parameters for Doubly-Fed Wind Turbines Based on Improved Recurrent Neural Networks Under Wind Speed Fluctuations.
IEEE Access, 2023

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

A Self-attention Feature Metric Learning Method for Remote Sensing Image Retrieval.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

Optical Remote Sensing Image Defogging Algorithm based on Different Wavelength.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

On the Preferences of Quality Indicators for Multi-Objective Search Algorithms in Search-Based Software Engineering (Hot Off the Press track at GECCO 2023).
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

A Foreground Feature Embedding Network for Object Detection in Remote Sensing Images.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

Automated Essay Scoring Incorporating Multi-level Semantic Features.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2023

2022
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment.
IEEE Trans. Dependable Secur. Comput., 2022

SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN.
Secur. Commun. Networks, 2022

On the preferences of quality indicators for multi-objective search algorithms in search-based software engineering.
Empir. Softw. Eng., 2022

Enhancing short-term crime prediction with human mobility flows and deep learning architectures.
EPJ Data Sci., 2022

College Students Online Education Evaluation Through SWOT Analysis During COVID-19.
IEEE Access, 2022

Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Towards Understanding Third-party Library Dependency in C/C++ Ecosystem.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Explore the process conditions for the production of C4 olefins by the coupling of ethanol.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

DASH: An Agile Knowledge Graph System Disentangling Demands, Algorithms, Data Resources, and Humans.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Correction to "Dynamic Security and Stability Region Under Different Renewable Energy Permeability in IENGS System".
IEEE Access, 2021

Dynamic Security and Stability Region Under Different Renewable Energy Permeability in IENGS System.
IEEE Access, 2021

Privacy Protection and Secure Transmission of Smart Meter Data.
Proceedings of the 15th International Symposium on Medical Information and Communication Technology, 2021

2020
Three-dimensional aerial base station location for sudden traffic with deep reinforcement learning in 5G mmWave networks.
Int. J. Distributed Sens. Networks, 2020

A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations.
Int. J. Bifurc. Chaos, 2020

Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020

A Chaos Disturbed Beetle Antennae Search Algorithm for a Multiobjective Distribution Network Reconfiguration Considering the Variation of Load and DG.
IEEE Access, 2020

Flexibility Robust Optimal Operation Strategy for Cross-Regional Interconnected Power Under Load-Source Coordination.
IEEE Access, 2020

An Improved Beetle Swarm Algorithm Based on Social Learning for a Game Model of Multiobjective Distribution Network Reconfiguration.
IEEE Access, 2020

A Social Beetle Swarm Algorithm Based on Grey Target Decision-Making for a Multiobjective Distribution Network Reconfiguration Considering Partition of Time Intervals.
IEEE Access, 2020

Spatial Accessibility and Equity of Public Libraries in Urban Settings.
Proceedings of the Sustainable Digital Communities - 15th International Conference, 2020

A Differential Analog Receiver Front-End for Galvanic-Coupled Human Body Communication.
Proceedings of the 2020 IEEE International Instrumentation and Measurement Technology Conference, 2020

Addressing Under-Reporting to Enhance Fairness and Accuracy in Mobility-based Crime Prediction.
Proceedings of the SIGSPATIAL '20: 28th International Conference on Advances in Geographic Information Systems, 2020

2019
Evaluation and Suppression of a Low-Frequency Output Voltage Ripple of a Single-Stage AC-DC Converter Based on an Output Impedance Model.
IEEE Trans. Ind. Electron., 2019

Understanding Cycling Trip Purpose and Route Choice Using GPS Traces and Open Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Agent-based dynamic simulation of an electricity market with multilateral bidding.
Int. J. Model. Simul. Sci. Comput., 2019

DNMHMM: An approach to identify the differential nucleosome regions in multiple cell types based on a Hidden Markov Model.
Biosyst., 2019

Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps.
IEEE Access, 2019

Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

3D Aerial Vehicle Base Station (UAV-BS) Position Planning based on Deep Q-Learning for Capacity Enhancement of Users With Different QoS Requirements.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

3D Aerial Base Station Position Planning based on Deep Q-Network for Capacity Enhancement.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Characterization of internal migrant behavior in the immediate post-migration period using cell phone traces.
Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 2019

Predicting Perceived Level of Cycling Safety for Cycling Trips.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

Timeless Homes: Exploring Genealogy and Family Histories through Co-Design with Children.
Proceedings of the 18th ACM International Conference on Interaction Design and Children, 2019

2018
Image encryption using 2D Hénon-Sine map and DNA approach.
Signal Process., 2018

Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation.
Signal Process., 2018

Variation of Net Primary Production and Its Correlation with Climate Change and Anthropogenic Activities over the Tibetan Plateau.
Remote. Sens., 2018

Information Needs and Communication Gaps between Citizens and Local Governments Online during Natural Disasters.
Inf. Syst. Frontiers, 2018

Full-Automatic Optic Disc Boundary Extraction Based on Active Contour Model with Multiple Energies.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Predicting Perceived Cycling Safety Levels Using Open and Crowdsourced Data.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

An analysis of the relationship between crime incidents and 911 calls.
Proceedings of the Building & Sustaining an Ethical Future with Emerging Technology, 2018

2017
Color image encryption based on chaotic systems and elliptic curve ElGamal scheme.
Signal Process., 2017

2010
GeeAir: a universal multimodal remote control device for home appliances.
Pers. Ubiquitous Comput., 2010

GeeAir: Waving in the Air to Control Home Appliances.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

MagicPhone: pointing & interacting.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
Gesture Recognition with a 3-D Accelerometer.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009


  Loading...