Jiandong Wang

According to our database1, Jiandong Wang authored at least 114 papers between 1991 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Fault-Tolerant Attitude Control for Rigid Spacecraft Without Angular Velocity Measurements.
IEEE Trans. Cybern., 2021

Static Gain Estimation for Automatic Generation Control Systems From Historical Ramp Responses.
IEEE Trans. Control. Syst. Technol., 2021

Fast Fault Detection and Location System for Distribution Network Lines Based on Power Electronic Disturbance Signals.
J. Circuits Syst. Comput., 2021

2020
Designing Dynamic Alarm Limits and Adjusting Manipulated Variables for Multivariate Systems.
IEEE Trans. Ind. Electron., 2020

Alarm Monitoring for Multivariate Processes Based on a Convex-Hull Normal Operating Zone.
IEEE Trans. Control. Syst. Technol., 2020

Alarm Event Prediction From Historical Alarm Flood Sequences Based on Bayesian Estimators.
IEEE Trans Autom. Sci. Eng., 2020

Multigranulation consensus fuzzy-rough based attribute reduction.
Knowl. Based Syst., 2020

Achieving large and distant ancestral genome inference by using an improved discrete quantum-behaved particle swarm optimization algorithm.
BMC Bioinform., 2020

AnnoGen: annotating genome-wide pragmatic features.
Bioinform., 2020

Identification of Multiple First-Order Continuous-Time Dynamic Models From Special Segments in Historical Data.
IEEE Access, 2020

Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Joint Grid Discretization for Biological Pattern Discovery.
Proceedings of the BCB '20: 11th ACM International Conference on Bioinformatics, 2020

Uncovering the Trust Transfer Mechanisms in a Blockchain-Based Healthcare Platform: A Mixed Method.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Indexing and Designing Deadbands for Industrial Alarm Signals.
IEEE Trans. Ind. Electron., 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019

Determining the number of segments for piece-wise linear representation of discrete-time signals.
Comput. Chem. Eng., 2019

Selection of Root-Cause Process Variables Based on Qualitative Trends in Historical Data Samples.
IEEE Access, 2019

Steady-State Interval Detection and Nonlinear Modeling for Automatic Generation Control Systems.
IEEE Access, 2019

Performance assessment of primary frequency regulation based on static characteristics.
Proceedings of the 58th Annual Conference of the Society of Instrument and Control Engineers of Japan, 2019

Examining Individuals' Ads Click Intention in the Wechat Moments: A Lens of Elaboration Likelihood Model.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

The Application of Machine Learning Algorithms to Diagnose CKD Stages and Identify Critical Metabolites Features.
Proceedings of the Bioinformatics and Biomedical Engineering, 2019

On Industrial Alarm Deadbands for Univariate Analog Signals.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
Multivariate Alarm Systems for Time-Varying Processes Using Bayesian Filters With Applications to Electrical Pumps.
IEEE Trans. Ind. Informatics, 2018

A Layered-Coevolution-Based Attribute-Boosted Reduction Using Adaptive Quantum-Behavior PSO and Its Consistent Segmentation for Neonates Brain Tissue.
IEEE Trans. Fuzzy Syst., 2018

Criteria and Algorithms for Online and Offline Detections of Industrial Alarm Floods.
IEEE Trans. Control. Syst. Technol., 2018

Winter Wheat Production Estimation Based on Environmental Stress Factors from Satellite Observations.
Remote. Sens., 2018

A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

Evolutionary under-sampling based bagging ensemble method for imbalanced data classification.
Frontiers Comput. Sci., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

Searching historical data segments for process identification in feedback control loops.
Comput. Chem. Eng., 2018

An incremental harmonic balance-based approach for harmonic analysis of closed-loop systems with Prandtl-Ishlinskii operator.
Autom., 2018

2017
Design of Alarm Trippoints for Univariate Analog Process Variables Based on Alarm Probability Plots.
IEEE Trans. Ind. Electron., 2017

An efficient semi-supervised representatives feature selection algorithm based on information theory.
Pattern Recognit., 2017

Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

How does web-based virtual reality affect learning: evidences from a quasi-experiment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Estimation of the Most Critical Parameter for the Two-Movement Method to Compensate for Oscillations Caused by Control Valve Stiction.
IEEE Trans. Control. Syst. Technol., 2016

An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems.
IEEE Trans Autom. Sci. Eng., 2016

A fine-grained context-aware access control model for health care and life science linked data.
Multim. Tools Appl., 2016

A robust multi-class AdaBoost algorithm for mislabeled noisy data.
Knowl. Based Syst., 2016

一种基于中介真值程度度量的模糊综合评价方法 (Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree).
计算机科学, 2016

A hierarchical-coevolutionary-MapReduce-based knowledge reduction algorithm with robust ensemble Pareto equilibrium.
Inf. Sci., 2016

Margin distribution explanation on metric learning for nearest neighbor classification.
Neurocomputing, 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

Local Community Detection Based on Bridges Ideas.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

Frequency response analysis for closed-loop systems with hysteresis using incremental harmonic balance.
Proceedings of the 2016 American Control Conference, 2016

Analysis and compensation of control valve stiction-induced limit cycles.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2016

2015
Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method.
IEEE Trans. Autom. Control., 2015

An empirical margin explanation for the effectiveness of DECORATE ensemble learning algorithm.
Knowl. Based Syst., 2015

标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015

A more efficient attribute self-adaptive co-evolutionary reduction algorithm by combining quantum elitist frogs and cloud model operators.
Inf. Sci., 2015

Semi-Supervised Local Fisher Discriminant Analysis Based on Reconstruction Probability Class.
Int. J. Pattern Recognit. Artif. Intell., 2015

A new method to detect and quantify correlated alarms with occurrence delays.
Comput. Chem. Eng., 2015

An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
Bagging-like metric learning for support vector regression.
Knowl. Based Syst., 2014

An FAR-SW based approach for webpage information extraction.
Inf. Syst. Frontiers, 2014

An online method to remove chattering and repeating alarms based on alarm durations and intervals.
Comput. Chem. Eng., 2014

Breast tissue segmentation on MR images using KFCM with spatial constraints.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
Detection of Correlated Alarms Based on Similarity Coefficients of Binary Data.
IEEE Trans Autom. Sci. Eng., 2013

A novel approach to minimum attribute reduction based on quantum-inspired self-adaptive cooperative co-evolution.
Knowl. Based Syst., 2013

A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network.
Knowl. Based Syst., 2013

A sock puppet detection algorithm on virtual spaces.
Knowl. Based Syst., 2013

Principles and Model for Web Dataspace.
J. Comput., 2013

Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

An online method for detection and reduction of chattering alarms due to oscillation.
Comput. Chem. Eng., 2013

Current Attitude Prediction Model Based on Game Theory.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

A novel quantum cooperative co-evolutionary algorithm for large-scale minimum attribute reduction optimization.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
Regularization Path for ν-Support Vector Classification.
IEEE Trans. Neural Networks Learn. Syst., 2012

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD.
IEEE Trans Autom. Sci. Eng., 2012

Accurate on-line v-support vector learning.
Neural Networks, 2012

Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction.
J. Softw., 2012

Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets.
Int. J. Pattern Recognit. Artif. Intell., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

Local margin based semi-supervised discriminant embedding for visual recognition.
Neurocomputing, 2011

Elasto-plastic Collapse Strength Calculation of Casing under Pure External Pressure.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

A Bricklaying Best-Fit Heuristic Algorithm for the Orthogonal Rectangle Packing Problem.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals.
J. Digit. Content Technol. its Appl., 2010

Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning.
J. Digit. Content Technol. its Appl., 2010

Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform.
J. Digit. Content Technol. its Appl., 2010

Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

Ordinal-Class Core Vector Machine.
J. Comput. Sci. Technol., 2010

Subspace identification methods for Hammerstein systems: rank constraint and dimension problem.
Int. J. Control, 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Averaged alarm delay and systematic design for alarm systems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A formal method for integrating distributed ontologies and reducing the redundant relations.
Kybernetes, 2009

Identification of Hammerstein systems without explicit parameterisation of non-linearity.
Int. J. Control, 2009

Revisiting Hammerstein system identification through the Two-Stage Algorithm for bilinear parameter estimation.
Autom., 2009

Identification of linear dynamic systems operating in a networked environment.
Autom., 2009

Anonymous Conditional Proxy Re-encryption without Random Oracle.
Proceedings of the Provable Security, Third International Conference, 2009

An Embedded Load Balancing System for High Speed OC192 Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Study and Safety Analysis on UCONonA Model.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Revisiting the Two-Stage Algorithm for Hammerstein system identification.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

On system identification in a networked environment.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

On-line off-line Ranking Support Vector Machine and analysis.
Proceedings of the International Joint Conference on Neural Networks, 2008

A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Weighted Margin Multi-Class Core Vector Machines.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A blind approach to closed-loop identification of Hammerstein systems.
Int. J. Control, 2007

SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

On Dynamic and Concurrent Model of Web Service Components.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Blind Hammerstein Identification for MR Damper Modeling.
Proceedings of the American Control Conference, 2007

2006
Cyclo-period estimation for discrete-time cyclo-stationary signals.
IEEE Trans. Signal Process., 2006

On Semantic-based cooperation among Web Services.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
On spectral theory of cyclostationary signals in multirate systems.
IEEE Trans. Signal Process., 2005

An Integrated Approach for Mining Meta-rules.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2005

1991
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts.
Proceedings of the Methodologies for Intelligent Systems, 6th International Symposium, 1991


  Loading...