Jiajia Xu

Orcid: 0000-0002-4091-1349

According to our database1, Jiajia Xu authored at least 23 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Compressive sensing reconstruction of hyperspectral images based on codec space-spectrum joint dense residual network.
IET Image Process., February, 2023

Simulations of Bubble Formation and Oscillation Behavior in Micro-Leakage Measurement System.
IEEE Trans. Instrum. Meas., 2023

A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components.
Remote. Sens., 2023

Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

E-Yolov7: A Life Jacket Detection Algorithm Based on Yolov7.
Proceedings of the Fuzzy Systems and Data Mining IX, 2023

2022
Impulsive Purchase in Agricultural Products Livestreaming: An ELM Model.
Proceedings of the HCI International 2022 - Late Breaking Posters, 2022

2021
PCCM-GAN: Photographic Text-to-Image Generation with Pyramid Contrastive Consistency Model.
Neurocomputing, 2021

2020
Jointly Learning Commonality and Specificity Dictionaries for Person Re-Identification.
IEEE Trans. Image Process., 2020

Cloud-Aware Generative Network: Removing Cloud From Optical Remote Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2020

Audinet: A Decentralized Auditing System for Cloud Storage.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Design of Timing Charging and Discharging System for Pneumatic or Hydraulic Pressure Device Based on STM32.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

2019
Top distance regularized projection and dictionary learning for person re-identification.
Inf. Sci., 2019

Detecting Link Correlation Spoofing Attack: A Beacon-Trap Approach.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Peer-to-Peer Energy Sharing: Effective Cost-Sharing Mechanisms and Social Efficiency.
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019

2018
链路相关性欺骗攻击与检测机制 (Link Correlation Spoofing Attack and Detection Mechanism).
计算机科学, 2018

2017
Unified entropy-based sorting for reversible data hiding.
Multim. Tools Appl., 2017

Optimal structural similarity constraint for reversible data hiding.
Multim. Tools Appl., 2017

2016
An Buffering Optimization Algorithm for Cooperative Mobile Service.
Proceedings of the Smart Computing and Communication, 2016

Second Order Perdicting-Error Sorting for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Range resolution improvement of range gated lidar system by phase coded method.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

2012
A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011


  Loading...