Jian Gong

According to our database1, Jian Gong authored at least 122 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A Bistatic MIMO Radar Angle Estimation Method for Coherent Sources in Impulse Noise Background.
Wirel. Pers. Commun., 2021

Regions Preserving Edge Enhancement for Multisensor-Based Medical Image Fusion.
IEEE Trans. Instrum. Meas., 2021

MyNeutronDAQ: A general program for data acquisition of neutron scattering spectrometers at China Mianyang Research Reactor and on-line data-analysis.
Softw. Pract. Exp., 2021

A Novel Method for Fast Positioning of Non-Standardized Ground Control Points in Drone Images.
Remote. Sens., 2021

DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN.
Peer-to-Peer Netw. Appl., 2021

Low observable group targets detection based on space-frequency cascaded adaptive processing for MIMO OTH radar.
Multidimens. Syst. Signal Process., 2021

Composite towed jamming countermeasure method based on polarization channel expansion and blind source separation.
Multidimens. Syst. Signal Process., 2021

RF Vital Sign Sensing under Free Body Movement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Robust Inertial Motion Tracking through Deep Sensor Fusion across Smart Earbuds and Smartphone.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Exploring real-time super-resolution generative adversarial networks.
Int. J. Sens. Networks, 2021

Identifying DGA Malware via Behavior Analysis.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Kinematics Modeling and Trajectory Planning for the Skull Reconstruction Robot.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

The Invisible Shadow: How Security Cameras Leak Private Activities.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Spatial Mapping Method of Craniosynostosis Surgical Robot Based on Point Cloud Registration.
Proceedings of the 6th Asia-Pacific Conference on Intelligent Robot Systems, 2021

2020
Patch-based cellular automata model of urban growth simulation: Integrating feedback between quantitative composition and spatial configuration.
Comput. Environ. Urban Syst., 2020

Carbon Dynamics in the Northeastern Qinghai-Tibetan Plateau from 1990 to 2030 Using Landsat Land Use/Cover Change Data.
Remote. Sens., 2020

Sampling-based cooperative adaptive cruise control subject to communication delays and actuator lags.
Math. Comput. Simul., 2020

An on-demand off-path cache exploration based multipath forwarding strategy.
Comput. Networks, 2020

The Prediction of Dam Displacement Time Series Using STL, Extra-Trees, and Stacked LSTM Neural Network.
IEEE Access, 2020

Passive radar channel estimation based on PN sequence of DTMB signal.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

A Novel Integrating Configuration and A Power Distribution Method for MMC-Based Grid-Connected PV System with Integrated Batteries.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

A Current-stress-optimized Control Strategy for DAB Converter Using Hybrid Modulation.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Effect of Perceptual Training on the Production of English Tense-Lax Vowels by Native Chinese Speakers.
Proceedings of the International Conference on Asian Language Processing, 2020

A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN.
Proceedings of the IEEE Global Communications Conference, 2020

Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission.
Proceedings of the IEEE Global Communications Conference, 2020

Extraction of cutting plans in craniosynostosis using convolutional neural networks.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

Temporal and Formant Trajectory Analysis of English Tense-Lax Vowels Produced by Native Chinese Speakers.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
A Robust Angle Estimation Method for Bistatic MIMO Radar About Non-stationary Random Noise.
Wirel. Pers. Commun., 2019

An Angle Estimation Method for Monostatic MIMO Radar Based on RCC-FLOM Algorithm.
Wirel. Commun. Mob. Comput., 2019

IP backbone traffic behavior characteristic spectrum composing and role mining.
CCF Trans. Netw., 2019

An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone.
IEEE Access, 2019

A Power Distribution Control Strategy Between Energy Storage Elements and Capacitors for Cascaded Multilevel Inverter With Hybrid Energy Sources.
IEEE Access, 2019

Useful Traffic Loss Rate Estimation Based on Network Layer Measurement.
IEEE Access, 2019

Detecting Sarcastic and Complimentary Exclamations in English with Intonation patterns and Acoustic Features: A Case Study.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2019

Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

A 20GS/s Track-and-Hold Amplifier based on InP DHBT Process.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

Comparing Native Chinese Listeners' Speech Reception Thresholds for Mandarin and English Consonants.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Evolutionary Fault Tolerance Method Based on Virtual Reconfigurable Circuit With Neural Network Architecture.
IEEE Trans. Evol. Comput., 2018

Airborne radar space time adaptive processing based on atomic norm minimization.
Signal Process., 2018

Sampled-data vehicular platoon control with communication delay.
J. Syst. Control. Eng., 2018

Resilient design and operations of process systems: Nonlinear adaptive robust optimization model and algorithm for resilience analysis and enhancement.
Comput. Chem. Eng., 2018

Identifying Fast-Flux Botnet With AGD Names at the Upper DNS Hierarchy.
IEEE Access, 2018

Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities.
IEEE Access, 2018

Jointly Iterative Adaptive Approach Based Space Time Adaptive Processing Using MIMO Radar.
IEEE Access, 2018

A Self-organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

SRLA: A Real Time Sliding Time Window Super Point Cardinality Estimation Algorithm for High Speed Network Based on GPU.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Nonlinear Adaptive Robust Optimization Model and Algorithm for Resilience Analysis and Enhancement.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Direction Finding with Real-Valued ESPRIT for Noncircular Signal in Bistatic MIMO Radar.
Wirel. Pers. Commun., 2017

Angle Estimation and Self-calibration Method for Bistatic MIMO Radar with Transmit and Receive Array Errors.
Circuits Syst. Signal Process., 2017

A systematic simulation-based process intensification method for shale gas processing and NGLs recovery process systems under uncertain feedstock compositions.
Comput. Chem. Eng., 2017

High Speed Network Super Points Detection Based on Sliding Time Window by GPU.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Convergence-Boosted Graph Partitioning using Maximum Spanning Trees for Iterative Solution of Large Linear Circuits.
Proceedings of the 54th Annual Design Automation Conference, 2017

An Online Prediction Algorithm of Traffic in Big Data Based on the Storm.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
Detection of Superpoints Using a Vector Bloom Filter.
IEEE Trans. Inf. Forensics Secur., 2016

Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary.
Comput. Networks, 2016

Vision-based counting of pedestrians and cyclists.
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

Can Intensive Exposure to Foreign Language Sounds Affect the Perception of Native Sounds?
Proceedings of the Interspeech 2016, 2016

Backbone Traffic Pattern Analysing Based on Joint Entropy.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
A quantitative model of first language influence in second language consonant learning.
Speech Commun., 2015

Optimal trajectory searching based differential evolution.
Int. J. Wirel. Mob. Comput., 2015

RTT Estimation with Sampled Flow Data.
IEICE Trans. Commun., 2015

A real-time method for detecting internet-wide SYN flooding attacks.
Proceedings of the 2015 IEEE International Workshop on Local and Metropolitan Area Networks, 2015

Prosodic patterns of noun phrases in English, Mandarin and L2 English.
Proceedings of the 18th International Congress of Phonetic Sciences, 2015

Effect of experience on Chinese assimilation and identification of English consonants.
Proceedings of the 18th International Congress of Phonetic Sciences, 2015

Enhancing in-network caching by coupling cache placement, replacement and location.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An efficient global optimization algorithm for mixed-integer nonlinear fractional programs with separable concave terms.
Proceedings of the American Control Conference, 2015

2014
GRT: A Reconfigurable SDR Platform with High Performance and Usability.
SIGARCH Comput. Archit. News, 2014

Opportunistic On-Path Caching for Named Data Networking.
IEICE Trans. Commun., 2014

A high-performance and high-programmability reconfigurable wireless development platform.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

An efficient and flexible host-FPGA PCIe communication library.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

EPEE: an efficient PCIe communication library with easy-host-integration property for FPGA accelerators (abstract only).
Proceedings of the 2014 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2014

CANR: Cache-Aware Name-based Routing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
HHC: Hierarchical hardware checkpointing to accelerate fault recovery for SRAM-based FPGAs.
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013

PhD forum: Not so cooperative caching.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Not So Cooperative Caching in Named Data Networking.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Efficient management of uncertainty in XML schema matching.
VLDB J., 2012

Evaluating Probabilistic Queries over Uncertain Matching.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

A reliable and accurate indoor localization method using phone inertial sensors.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Identifying Elephant Flows Using a Reversible MultiLayer Hashed Counting Bloom Filter.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Off-path leakage power aware routing for SRAM-based FPGAs.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Distributed in-network cooperative caching.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Estimating network path loss episode frequency by passive measurement.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
A Computational Modelling Approach to the Development of L2 Sound Acquisition.
Proceedings of the 17th International Congress of Phonetic Sciences, 2011

NetFlow-based network traffic monitoring.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
Mining non-redundant diverse patterns: an information theoretic perspective.
Frontiers Comput. Sci. China, 2010

Managing uncertainty of XML schema matching.
Proceedings of the 26th International Conference on Data Engineering, 2010

2009
An Improved Algorithm for Mining Non-Redundant Interacting Feature Subsets.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

Robustness of evolvable hardware in the case of fault and environmental change.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Mining Entropy l-Diversity Patterns.
Proceedings of the Database Systems for Advanced Applications, 2009

XML Data Integration Using Fragment Join.
Proceedings of the Database Systems for Advanced Applications, 2009

Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Double sampling for flow measurement on high speed links.
Comput. Networks, 2008

Adaptive sampling algorithm for detection of superpoints.
Sci. China Ser. F Inf. Sci., 2008

XOR Hashing Algorithms to Measured Flows at the High-Speed Link.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Detecting Superpoint Algorithm on Multiple Sampling Technology.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Sampling Method for Intrusion Detection System.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
A Resource-Efficient Flow Monitoring System.
IEEE Commun. Lett., 2007

Identifying BT-like P2P Traffic by the Discreteness of Remote Hosts.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

An Intrusion Plan Recognition Algorithm Based on Max-1-Connected Causal Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Hybrid Sampling Approach for Network Flow Monitoring.
Proceedings of the Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2007

2006
Study of Dynamic Timeout Strategy based on flow rate metrics in high-speed networks.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

A New Algorithm for Long Flows Statistics-MGCBF.
Proceedings of the Computational Science, 2006

Disclosing the Element Distribution of Bloom Filter.
Proceedings of the Computational Science, 2006

Estimating Original Flow Length from Sampled Flow Statistics.
Proceedings of the Computational Science, 2006

An Algorithm for Estimation of Flow Length Distributions Using Heavy-Tailed Feature.
Proceedings of the Computational Science, 2006

Multi-Granularities Counting Bloom Filter.
Proceedings of the High Performance Computing and Communications, 2006

2005
Modeling gene expression networks using fuzzy logic.
IEEE Trans. Syst. Man Cybern. Part B, 2005

BarleyBase - an expression profiling database for plant genomics.
Nucleic Acids Res., 2005

An Effective and Efficient Approach for Keyword-Based XML Retrieval.
Proceedings of the Advances in Web-Age Information Management, 2005

A Time-Series Decomposed Model of Network Traffic.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Network Traffic Sampling Model on Packet Identification.
Proceedings of the Networking, 2005

A three-phase single-switch fly-back single-stage rectifier with lossless isolated snubber.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

2004
Research on automated rollbackability of intrusion response.
J. Comput. Secur., 2004

The Research of Formal Specification of Intrusion Detection Rules.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Estimating user-perceived Web QoS by means of passive measurement.
Proceedings of the 12th IEEE International Conference on Networks, 2004

A relative time model in a distributed network using exchanged time information.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
Intrusion detection system based on fuzzy default logic.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
A traffic sampling model for measurement using packet identification.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

1998
Fast recursive algorithms for two-dimensional thresholding.
Pattern Recognit., 1998

A traffic partition algorithm for switched LANs and its performance analysis.
J. Comput. Sci. Technol., 1998


  Loading...