Jianfeng Lu

According to our database1, Jianfeng Lu authored at least 67 papers between 1994 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Quantum Kinetic Monte Carlo Method for Quantum Many-Body Spin Dynamics.
SIAM J. Scientific Computing, 2018

A Quasi-nonlocal Coupling Method for Nonlocal and Local Diffusion Models.
SIAM J. Numerical Analysis, 2018

Frozen Gaussian approximation with surface hopping for mixed quantum-classical dynamics: A mathematical justification of fewest switches surface hopping algorithms.
Math. Comput., 2018

Non-concept density estimation via kernel regression for concept ranking in weakly labelled data.
IET Computer Vision, 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Transactions, 2018

Double Path Networks for Sequence to Sequence Learning.
CoRR, 2018

Butterfly-Net: Optimal Function Representation Based on Convolutional Neural Networks.
CoRR, 2018

Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier.
IEEE Access, 2018

Weighted group sparse functional connectivity modeling for Alzheimer's disease identification.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Fully Convolutional Neural Networks for Road Detection with Multiple Cues Integration.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Double Path Networks for Sequence to Sequence Learning.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

2017
Quasi-nonlocal Coupling of Nonlocal Diffusions.
SIAM J. Numerical Analysis, 2017

Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
Mobile Information Systems, 2017

The OU-ISIR Gait Database comprising the Large Population Dataset with Age and performance evaluation of age estimation.
IPSJ Trans. Computer Vision and Applications, 2017

Spatial Distribution Characteristics and Influencing Factors of Urban Residents' Travel Carbon Emissions in Guangzhou.
IJAL, 2017

Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Transactions, 2017

Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing.
CoRR, 2017

Rating Protocol Design for Extortion and Cooperation in the Crowdsourcing Contest Dilemma.
CoRR, 2017

An anti-copyscheme for laser label based on digitial watermarking.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Tampering Detection in Oral History Video Using Watermarking.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Analysis of the divide-and-conquer method for electronic structure calculations.
Math. Comput., 2016

An aesthetic QR code solution based on error correction mechanism.
Journal of Systems and Software, 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
IJHPCN, 2016

Exploring Brain Networks via Structured Sparse Representation of fMRI Data.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2016, 2016

Research on the energy efficiency and coordinating relations of the transportation in guangdong province.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

A New Card Authentication Scheme Based on Image Watermarking and Encryption.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Speed Invariance vs. Stability: Cross-Speed Gait Recognition Using Single-Support Gait Energy Image.
Proceedings of the Computer Vision - ACCV 2016, 2016

2015
Scanned binary image watermarking based on additive model and sampling.
Multimedia Tools Appl., 2015

AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Visual Communication and Image Representation, 2015

(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Multi-scale and Multimodal Fusion of Tract-Tracing, Myelin Stain and DTI-derived Fibers in Macaque Brains.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Distance Networks for Morphological Profiling and Characterization of DICCCOL Landmarks.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Fiber Connection Pattern-Guided Structured Sparse Representation of Whole-Brain fMRI Signals for Functional Network Inference.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015, 2015

Multiscale and multimodal fusion of tract-tracing and DTI-derived fibers in macaque brains.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

A real-time LIDAR and vision based pedestrian detection system for unmanned ground vehicles.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

2014
MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl.-Based Syst., 2014

Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Analyzing and removing SureSign watermark.
Signal Processing, 2013

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
JSW, 2013

Video Watermarking Algorithm for H.264 Scalable Video Coding.
TIIS, 2013

Assessing regularity and variability of cortical folding patterns of dicccols.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

Instance Selection and Instance Weighting for Cross-Domain Sentiment Classification via PU Learning.
Proceedings of the IJCAI 2013, 2013

An evolution strategy assisted by an ensemble of local Gaussian process models.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

2012
Study on Anti-worm Diffusion Strategies Based on B+ Address Tree.
JCP, 2012

Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Transactions, 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wireless Comm. and Networking, 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurrency and Computation: Practice and Experience, 2011

Ventricle Shape Analysis for Centenarians, Elderly Subjects, MCI and AD Patients.
Proceedings of the Multimodal Brain Image Analysis, First International Workshop, 2011

An augmented Lagrangian method for fast gradient vector flow computation.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Leveraging Wikipedia concept and category information to enhance contextual advertising.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Consistency Checking of Safety and Availability in Access Control.
IEICE Transactions, 2010

A Multimodal Virtual Anatomy E-Learning Tool for Medical Education.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

2007
A Bayes-Based Region-Growing Algorithm for Medical Image Segmentation.
Computing in Science and Engineering, 2007

2005
Virtual learning environment for medical education based on VRML and VTK.
Computers & Graphics, 2005

2004
An Algorithm of Mapping Additional Scalar Value in 2D Vector Field Visualization.
Proceedings of the Computational Science and Its Applications, 2004

2003
An Adaptive Thresholding Method for Gray-level Image based on Fuzzy Entropy Principle.
Proceedings of the Signal and Image Processing (SIP 2003), 2003

1995
A formal semantics for DAI language NUML.
J. Comput. Sci. Technol., 1995

1994
Agent Language NUML and Its Reduction Implementation Model Based on HOpi.
SIGPLAN Notices, 1994


  Loading...