Jiaming He

Orcid: 0009-0007-9529-7327

According to our database1, Jiaming He authored at least 16 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Backdoor Attacks against Image-to-Image Networks.
CoRR, 2024

Talk Too Much: Poisoning Large Language Models under Token Limit.
CoRR, 2024

DDN-SLAM: Real-time Dense Dynamic Neural Implicit SLAM with Joint Semantic Encoding.
CoRR, 2024

PLE-SLAM: A Visual-Inertial SLAM Based on Point-Line Features and Efficient IMU Initialization.
CoRR, 2024

Mtisa: Multi-Target Image-Scaling Attack.
Proceedings of the IEEE International Conference on Communications, 2024

2023
End-to-End RGB-D SLAM With Multi-MLPs Dense Neural Implicit Representations.
IEEE Robotics Autom. Lett., November, 2023

2020
Hierarchical Matching Network for Heterogeneous Entity Resolution.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2015
Congestion Control, Routing, and Scheduling in Wireless Networks With Interference Cancelation Capabilities.
IEEE Trans. Veh. Technol., 2015

2014
Understanding the Benefits of Successive Interference Cancellation in Multi-Rate Multi-Hop Wireless Networks.
IEEE Trans. Commun., 2014

A Grey List-Based Privacy Protection for Android.
J. Softw., 2014

A Participation-Based Trust Model for Mobile P2P Networks.
J. Networks, 2014

Distributed link scheduling in wireless networks with interference cancellation capabilities.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

2010
Low-complexity Grouping Spectrum Management in Multi-user DSL Networks.
J. Next Gener. Inf. Technol., 2010

2009
Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications Equipment.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Digital Right Management Model Based on Cryptography and Digital Watermarking.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...