Jian Shen

According to our database1, Jian Shen authored at least 166 papers between 1995 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.



In proceedings 
PhD thesis 


On csauthors.net:


Optimization of preventive maintenance for series manufacturing system by differential evolution algorithm.
J. Intelligent Manufacturing, 2020

Collaborative filtering-based recommendation system for big data.
Int. J. Comput. Sci. Eng., 2020

Fault detection observer design for discrete-time 2-D T-S fuzzy systems with finite-frequency specifications.
Fuzzy Sets Syst., 2020

Bidirectional Model-based Policy Optimization.
CoRR, 2020

Large-Scale Optimal Transport via Adversarial Training with Cycle-Consistency.
CoRR, 2020

ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020

TADS: Learning Time-Aware Scheduling Policy with Dyna-Style Planning for Spaced Repetition.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Improving Knowledge Tracing via Pre-training Question Embeddings.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Trip mode recognition using smartphone sensor data under different sampling frequencies.
Web Intell., 2019

Multimodal Depression Detection: Fusion of Electroencephalography and Paralinguistic Behaviors Using a Novel Strategy for Classifier Ensemble.
IEEE J. Biomed. Health Informatics, 2019

The study of interference effect in a globally coupled quantum network.
Quantum Inf. Process., 2019

Synchronization problem of 2-D coupled dynamical networks with communication delays and missing measurements.
Multidimens. Syst. Signal Process., 2019

Publicly verifiable privacy-preserving aggregation and its application in IoT.
J. Netw. Comput. Appl., 2019

Three-dimensional stable matching with hybrid preferences.
J. Comb. Optim., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Stability and constrained control for positive two-dimensional systems with delays in the second FM model.
IMA J. Math. Control. Inf., 2019

Filter design for discrete-time two-dimensional T-S fuzzy systems with finite frequency specification.
Int. J. Syst. Sci., 2019

Recognition and localization of actinidia arguta based on image recognition.
EURASIP J. Image and Video Processing, 2019

Improving Unsupervised Domain Adaptation with Variational Information Bottleneck.
CoRR, 2019

Towards Efficient and Unbiased Implementation of Lipschitz Continuity in GANs.
CoRR, 2019

The role of ultrasound in the diagnosis of the coexistence of primary hyperparathyroidism and non-medullary thyroid carcinoma.
BMC Medical Imaging, 2019

Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Huber based Unscented Kalman Filter Terrain Matching Algorithm for Underwater Autonomous Vehicle.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Individual Similarity Guided Transfer Modeling for EEG-based Emotion Recognition.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Depression Detection from Electroencephalogram Signals Induced by Affective Auditory Stimuli.
Proceedings of the 8th International Conference on Affective Computing and Intelligent Interaction, 2019

Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.
J. Supercomput., 2018

Linear complexity of a class of pseudorandom sequences over a general finite field.
Soft Comput., 2018

Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

Propagation of firing rate by synchronization in a feed-forward multilayer Hindmarsh-Rose neural network.
Neurocomputing, 2018

Secure intelligent traffic light control using fog computing.
Future Gener. Comput. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018

Dynamic Behaviors in Coupled Neuron System with the Excitatory and Inhibitory Autapse under Electromagnetic Induction.
Complexity, 2018

Fingerprint-based access to personally controlled health records in emergency situations.
Sci. China Inf. Sci., 2018

New Upper Bounds For The Bondage Number Of A Graph In Terms Of Its Maximum Degree And Euler Characteristic.
Ars Comb., 2018

A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Label-Aware Double Transfer Learning for Cross-Specialty Medical Named Entity Recognition.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

Emotion Recognition Based on Electroencephalogram Using a Multiple Instance Learning Framework.
Proceedings of the Intelligent Computing Theories and Application, 2018

Wasserstein Distance Guided Representation Learning for Domain Adaptation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Adaptive task scheduling strategy in cloud: when energy consumption meets performance guarantee.
World Wide Web, 2017

A query refinement framework for xml keyword search.
World Wide Web, 2017

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices.
Wireless Personal Communications, 2017

A Fairness-Enhanced Micropayment Scheme.
Wireless Personal Communications, 2017

EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs.
Telecommunication Systems, 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Extremal Bases for Finite Cyclic Groups.
SIAM J. Discret. Math., 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks.
J. Inf. Sci. Eng., 2017

Finite frequency filter design for nonlinear 2-D continuous systems in T-S form.
J. Frankl. Inst., 2017

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017

Stability and positive observer design for positive 2D discrete-time system with multiple delays.
Int. J. Syst. Sci., 2017

Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence.
Int. J. Found. Comput. Sci., 2017

Classification model for imbalanced traffic data based on secondary feature extraction.
IET Communications, 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Comput. Stand. Interfaces, 2017

Adversarial Representation Learning for Domain Adaptation.
CoRR, 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017

Sliding Block-Based Hybrid Feature Subset Selection in Network Traffic.
IEEE Access, 2017

Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Wearable EEG-Based Real-Time System for Depression Monitoring.
Proceedings of the Brain Informatics - International Conference, 2017

Normalized mutual information feature selection for electroencephalogram data based on grassberger entropy estimator.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

A novel depression detection method based on pervasive EEG and EEG splitting criterion.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

An Integrated LSTM Prediction Method Based on Multi-scale Trajectory Space.
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Security and Communication Networks, 2016

Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems.
MONET, 2016

一种基于样本加权的多尺度核支持向量机方法 (Novel Multi-scale Kernel SVM Method Based on Sample Weighting).
计算机科学, 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System.
KSII Trans. Internet Inf. Syst., 2016

A Privacy-Preserving Health Data Aggregation Scheme.
KSII Trans. Internet Inf. Syst., 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

Consensus-based sparse signal reconstruction algorithm for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things.
IEICE Trans. Inf. Syst., 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intell. Autom. Soft Comput., 2016

Innovia Vehicle Radiated Emission Investigation and CENELEC Compliance Solution.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

A Route Planning Method for Underwater Terrain Aided Positioning Based on Gray Wolf Optimization Algorithm.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

A semantic tree-based approach for sketch-based 3D model retrieval.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

A cloud based framework of prognostics and health management for manufacturing industry.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

Four-dimensional descent trajectory optimization for aircraft in turbulence.
Proceedings of the IEEE International Conference on Information and Automation, 2016

A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

基于判别式受限玻尔兹曼机的医学图像分类法 (Medical Image Classification Method Based on Discriminative Restricted Boltzmann Machine).
计算机科学, 2015

KDVEM : a k-degree anonymity with vertex and edge modification algorithm.
Computing, 2015

PiPDR: A Placement-Independent Pedestrian Dead Reckoning System in Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015

Lower bounds for r<sub>2</sub>(K<sub>1</sub>+G) and r<sub>3</sub>(K<sub>1</sub>+G) from Paley graph and generalization.
Eur. J. Comb., 2014

On the relative distances of eleven points in the boundary of a plane convex body.
Discret. Math., 2014

Practical Routing Protocol for Impromptu Mobile Social Networks.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Online Shopping Preference Analysis of Campus Network Users Based on MapReduce.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

Three Layer Q 2-Free Families in the Boolean Lattice.
Order, 2013

A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks.
J. Comput. Sci., 2013

On fractional Metric Dimension of graphs.
Discrete Math., Alg. and Appl., 2013

Bounds on the Number of Huffman and Binary-Ternary Trees
CoRR, 2013

A new lower bound on error probability for nonuniform signals over AWGN channels.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An enhanced routing algorithm for congestion control in a home energy management system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

On the relative distances of nine or ten points in the boundary of a plane convex body.
Discret. Appl. Math., 2012

Bounds on the spectral radii of digraphs in terms of walks.
Appl. Math. Comput., 2012

A novel spectrum sensing method in cognitive radio based on suprathreshold stochastic resonance.
Proceedings of IEEE International Conference on Communications, 2012

Enhanced delegation forwarding in delay tolerant networks.
Int. J. Parallel Emergent Distributed Syst., 2011

Analysis of Injection Molding of Thin-Walled Parts Based on Moldflow.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Development of Remote Monitoring and Control Device for 50KW PV System Based on the Wireless Network.
Proceedings of the Grid and Distributed Computing, 2011

On the Power Dominating Sets of Hypercubes.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Improving routing protocol performance in delay tolerant networks using extended information.
J. Syst. Softw., 2010

Some Inequalities in Functional Analysis, Combinatorics, and Probability Theory.
Electron. J. Comb., 2010

Accelerating Mutual-Information-Based Registration on multi-core systems.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

The kth upper bases of primitive non-powerful signed digraphs.
Discret. Math., 2009

Keyword Detection in Natural Language Based on Statistical Mechanics of Words in Written Texts
CoRR, 2009

A novel information model for efficient routing protocols in delay tolerant networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Written Texts as Statistical Mechanical Problem.
Proceedings of the Advances in Information Retrieval Theory, 2009

Probability Delegation Forwarding in Delay Tolerant Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Approximating the Spanning Star Forest Problem and Its Application to Genomic Sequence Alignment.
SIAM J. Comput., 2008

Bounds for Ramsey numbers of complete graphs dropping an edge.
Eur. J. Comb., 2008

Extension of Strongly Regular Graphs.
Electron. J. Comb., 2008

On the largest eigenvalue of non-regular graphs.
J. Comb. Theory, Ser. B, 2007

Approximating the spanning star forest problem and its applications to genomic sequence alignment.
Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2007

On two Turán Numbers.
Journal of Graph Theory, 2006

Improved schemes for power-efficient broadcast in ad hoc networks.
Int. J. High Perform. Comput. Netw., 2006

Characterization of [1, k]-Bar Visibility Trees.
Electron. J. Comb., 2006

Density Conditions For Triangles In Multipartite Graphs.
Comb., 2006

Time-variant doppler frequency estimation and compensation for mobile OFDM systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Semi-blind Joint Data Equalization and Channel Estimation for Meteor Burst Communication.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A new approach for a Windows-based watershed modeling system based on a database-supporting architecture.
Environ. Model. Softw., 2005

A tabu search algorithm for the routing and capacity assignment problem in computer networks.
Comput. Oper. Res., 2005

LilyTask Parallel Language 3.5 - Approach towards Task Parallel Programming in Heterogeneous SMP-Clusters.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

Energy Reducing Broadcasting Algorithms in Ad Hoc Networks.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Maximum Necessary Hop Count for Packet Routing in MANETs.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

On the Frame--Stewart Conjecture about the Towers of Hanoi.
SIAM J. Comput., 2004

A collaborative-shared control system with safe obstacle avoidance capability.
Proceedings of the 2004 IEEE Conference on Robotics, Automation and Mechatronics, 2004

Reducing Connected Dominating Set Size with Multipoint Relays in Ad Hoc Wireless Networks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Vehicle Following with Obstacle Avoidance Capabilities in Natural Environments.
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004

Target-tracking and path planning for vehicle following in jungle environment.
Proceedings of the 8th International Conference on Control, 2004

Discrete Branch Length Representations for Genetic Algorithms in Phylogenetic Search.
Proceedings of the Applications of Evolutionary Computing, 2004

Searching for Sorted Sequences of Kings in Tournaments.
SIAM J. Comput., 2003

HAD: An Automated Database Tool for Analyzing Screening Hits in Drug Discovery.
J. Chem. Inf. Comput. Sci., 2003

Short Cycles in Digraphs with Local Average Outdegree at Least Two.
Electron. J. Comb., 2003

Disjoint Cycles in Eulerian Digraphs and the Diameter of Interchange Graphs.
J. Comb. Theory, Ser. B, 2002

On the Caccetta-Häggkvist Conjecture.
Graphs Comb., 2002

A Note on the Number of Edges Guaranteeing a C4 in Eulerian Bipartite Digraphs.
Electron. J. Comb., 2002

Landau's inequalities for tournament scores and a short proof of a theorem on transitive sub-tournaments.
Journal of Graph Theory, 2001

Diameter of the NEPS of bipartite graphs.
Discret. Math., 2001

On the Girth of Digraphs with High Connectivity.
Ars Comb., 2001

An RTL Abstraction Technique for Processor Microarchitecture Validation and Test Generation.
J. Electronic Testing, 2000

Exponents of vertex-transitive digraphs.
Discret. Math., 2000

On the girth of digraphs.
Discret. Math., 2000

Exponents of 2-regular digraphs.
Discret. Math., 2000

Generalized Index of Boolean Matrices.
Ars Comb., 2000

Discrepancy of Matrices of Zeros and Ones.
Electron. J. Comb., 1999

Verification of Processor Microarchitectures.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999

Functional Verification of the Equator MAP1000 Microprocessor.
Proceedings of the 36th Conference on Design Automation, 1999

Filter-Based Coded-Excitation System for High Speed Ultrasonic Imaging.
IEEE Trans. Medical Imaging, 1998

Some results on generalized exponents.
Journal of Graph Theory, 1998

Directed Triangles in Digraphs.
J. Comb. Theory, Ser. B, 1998

Synthesis of Native Mode Self-Test Programs.
J. Electronic Testing, 1998

Native mode functional test generation for processors with applications to self test and design validation.
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998

On Combining Formal and Informal Verification.
Proceedings of the Computer Aided Verification, 9th International Conference, 1997

Electrostatic binding energy calculation using the finite difference solution to the linearized Poisson-Boltzmann equation: Assessment of its accuracy.
J. Comput. Chem., 1996

An improvement of the Dulmage-Mendelsohn theorem.
Discret. Math., 1996

The analysis of multigrid algorithms for cell centered finite difference methods.
Adv. Comput. Math., 1996

Real-time 3D pulse-echo ultrasonic imaging with coded-excitation systems.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

On the design of a transversal filter bank for parallel processing multiple image lines in real-time acoustic imaging.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

Calculation of Binding Energy Differences for Receptor-Ligand Systems Using the Poisson-Boltzmann Method.
J. Comput. Chem., 1995