Jianfeng Lu

According to our database1, Jianfeng Lu
  • authored at least 67 papers between 1994 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Frozen Gaussian approximation with surface hopping for mixed quantum-classical dynamics: A mathematical justification of fewest switches surface hopping algorithms.
Math. Comput., 2018

Non-concept density estimation via kernel regression for concept ranking in weakly labelled data.
IET Computer Vision, 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Transactions, 2018

Double Path Networks for Sequence to Sequence Learning.
CoRR, 2018

Butterfly-Net: Optimal Function Representation Based on Convolutional Neural Networks.
CoRR, 2018

Weighted group sparse functional connectivity modeling for Alzheimer's disease identification.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Kill Two Birds With One Stone: Weakly-Supervised Neural Network for Image Annotation and Tag Refinement.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Quasi-nonlocal Coupling of Nonlocal Diffusions.
SIAM J. Numerical Analysis, 2017

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mobile Information Systems, 2017

The OU-ISIR Gait Database comprising the Large Population Dataset with Age and performance evaluation of age estimation.
IPSJ Trans. Computer Vision and Applications, 2017

Spatial Distribution Characteristics and Influencing Factors of Urban Residents' Travel Carbon Emissions in Guangzhou.
IJAL, 2017

Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Transactions, 2017

Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing.
CoRR, 2017

Rating Protocol Design for Extortion and Cooperation in the Crowdsourcing Contest Dilemma.
CoRR, 2017

Asking the Difficult Questions: Goal-Oriented Visual Question Generation via Intermediate Rewards.
CoRR, 2017

Kill Two Birds with One Stone: Weakly-Supervised Neural Network for Image Annotation and Tag Refinement.
CoRR, 2017

An anti-copyscheme for laser label based on digitial watermarking.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Tampering Detection in Oral History Video Using Watermarking.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Towards understanding the gamification upon users' scores in a location-based social network.
Multimedia Tools Appl., 2016

Analysis of the divide-and-conquer method for electronic structure calculations.
Math. Comput., 2016

An aesthetic QR code solution based on error correction mechanism.
Journal of Systems and Software, 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
IJHPCN, 2016

Multi-Label Image Classification with Regional Latent Semantic Dependencies.
CoRR, 2016

Exploring Brain Networks via Structured Sparse Representation of fMRI Data.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2016, 2016

Research on the energy efficiency and coordinating relations of the transportation in guangdong province.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

A New Card Authentication Scheme Based on Image Watermarking and Encryption.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

SLNSW-UTS: A Historical Image Dataset for Image Multi-Labeling and Retrieval.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

Speed Invariance vs. Stability: Cross-Speed Gait Recognition Using Single-Support Gait Energy Image.
Proceedings of the Computer Vision - ACCV 2016, 2016

Scanned binary image watermarking based on additive model and sampling.
Multimedia Tools Appl., 2015

AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Visual Communication and Image Representation, 2015

(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Multi-scale and Multimodal Fusion of Tract-Tracing, Myelin Stain and DTI-derived Fibers in Macaque Brains.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Distance Networks for Morphological Profiling and Characterization of DICCCOL Landmarks.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Fiber Connection Pattern-Guided Structured Sparse Representation of Whole-Brain fMRI Signals for Functional Network Inference.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Multiscale and multimodal fusion of tract-tracing and DTI-derived fibers in macaque brains.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

A real-time LIDAR and vision based pedestrian detection system for unmanned ground vehicles.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl.-Based Syst., 2014

Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Analyzing and removing SureSign watermark.
Signal Processing, 2013

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
JSW, 2013

Video Watermarking Algorithm for H.264 Scalable Video Coding.
TIIS, 2013

Assessing regularity and variability of cortical folding patterns of dicccols.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

Instance Selection and Instance Weighting for Cross-Domain Sentiment Classification via PU Learning.
Proceedings of the IJCAI 2013, 2013

An evolution strategy assisted by an ensemble of local Gaussian process models.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Study on Anti-worm Diffusion Strategies Based on B+ Address Tree.
JCP, 2012

Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Transactions, 2012

RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wireless Comm. and Networking, 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurrency and Computation: Practice and Experience, 2011

Ventricle Shape Analysis for Centenarians, Elderly Subjects, MCI and AD Patients.
Proceedings of the Multimodal Brain Image Analysis, First International Workshop, 2011

An augmented Lagrangian method for fast gradient vector flow computation.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Leveraging Wikipedia concept and category information to enhance contextual advertising.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Consistency Checking of Safety and Availability in Access Control.
IEICE Transactions, 2010

A Multimodal Virtual Anatomy E-Learning Tool for Medical Education.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

A Bayes-Based Region-Growing Algorithm for Medical Image Segmentation.
Computing in Science and Engineering, 2007

Virtual learning environment for medical education based on VRML and VTK.
Computers & Graphics, 2005

An Algorithm of Mapping Additional Scalar Value in 2D Vector Field Visualization.
Proceedings of the Computational Science and Its Applications, 2004

An Adaptive Thresholding Method for Gray-level Image based on Fuzzy Entropy Principle.
Proceedings of the Signal and Image Processing (SIP 2003), 2003

A formal semantics for DAI language NUML.
J. Comput. Sci. Technol., 1995

Agent Language NUML and Its Reduction Implementation Model Based on HOpi.
SIGPLAN Notices, 1994