Jianguo Jiang

According to our database1, Jianguo Jiang authored at least 92 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Independent metric learning with aligned multi-part features for video-based person re-identification.
Multimedia Tools Appl., 2019

Deep feature representation and multiple metric ensembles for person re-identification in security surveillance system.
Multimedia Tools Appl., 2019

Local region partition for person re-identification.
Multimedia Tools Appl., 2019

Optimizing Multi-Granularity Region Similarity for Person Re-Identification.
IEEE Access, 2019

A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A New Hybrid Approach for C&C Channel Detection.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking.
IEEE Trans. Multimedia, 2018

Video-Based Person Re-Identification With Accumulative Motion Context.
IEEE Trans. Circuits Syst. Video Techn., 2018

A reliable speed controller for suppressing low frequency concussion of electric vehicle.
Microelectronics Reliability, 2018

Sequence-based Person Attribute Recognition with Joint CTC-Attention Model.
CoRR, 2018

A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios.
Proceedings of the 17th IEEE International Conference On Trust, 2018

BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Feature Fusion and Ellipse Segmentation for Person Re-identification.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Video-Based Person Re-identification with Adaptive Multi-part Features Learning.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Re-Ranking Person Re-Identification with Forward and Reverse Sorting Constraints.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Comprehensive Behavior Profiling Model for Malware Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

A Passive-Measurement-Guided Tree Network Surveying and Mapping Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems.
IEEE Trans. Reliability, 2017

Visual Classification of Furniture Styles.
ACM TIST, 2017

End-to-End Comparative Attention Networks for Person Re-Identification.
IEEE Trans. Image Processing, 2017

Unsupervised t-Distributed Video Hashing and Its Deep Hashing Extension.
IEEE Trans. Image Processing, 2017

Window switching strategy based semi-fragile watermarking for MP3 tamper detection.
Multimedia Tools Appl., 2017

Segmentation method for medical image based on improved GrabCut.
Int. J. Imaging Systems and Technology, 2017

Video-based Person Re-identification with Accumulative Motion Context.
CoRR, 2017

Neural Person Search Machines.
CoRR, 2017

Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

Design of T-type three-level energy storage inverter and grid-connected control strategy.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Fast finite control set model predictive control for three-phase five-level nested neutral point piloted converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Neural Person Search Machines.
Proceedings of the IEEE International Conference on Computer Vision, 2017

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Spatially guided local Laplacian filter for nature image detail enhancement.
Multimedia Tools Appl., 2016

Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games.
J. Comput. Sci. Technol., 2016

Visual summarization of image collections by fast RANSAC.
Neurocomputing, 2016

End-to-End Comparative Attention Networks for Person Re-identification.
CoRR, 2016

Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Person Re-identification by Multiple Feature Representations and Metric Learning.
Proceedings of the Intelligent Visual Surveillance - 4th Chinese Conference, 2016

Event Detection with Convolutional Neural Networks for Forensic Investigation.
Proceedings of the Intelligent Information Processing VIII, 2016

Towards Discovering Covert Communication Through Email Spam.
Proceedings of the Intelligent Information Processing VIII, 2016

2015
Kernelized Relaxed Margin Components Analysis for Person Re-identification.
IEEE Signal Process. Lett., 2015

Image classification based on low-rank matrix recovery and Naive Bayes collaborative representation.
Neurocomputing, 2015

Using binary particle swarm optimization to search for maximal successful coalition.
Appl. Intell., 2015

A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
PicWords: Render a Picture by Packing Keywords.
IEEE Trans. Multimedia, 2014

Research on the Multilevel STATCOM based on the H-bridge Cascaded.
JNW, 2014

Person Re-identification based on nonlinear ranking with difference vectors.
Inf. Sci., 2014

Automatic image annotation by semi-supervised manifold kernel density estimation.
Inf. Sci., 2014

Directional projection based image fusion quality metric.
Inf. Sci., 2014

On improving behavior subtraction.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Non-linear metric learning with multiple features for person re-identification.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Robust Anatomical Correspondence Detection by Hierarchical Sparse Graph Matching.
IEEE Trans. Med. Imaging, 2013

ε-Isometryε-Isometry based shape approximation for image content representation.
Signal Processing, 2013

A Monte Carlo Enhanced PSO Algorithm for Optimal QoM in Multi-Channel Wireless Networks.
J. Comput. Sci. Technol., 2013

Intervention Learning of Local Causal Structure Based on Sensitivity Analysis.
JCP, 2013

Advertising object in web videos.
Neurocomputing, 2013

Active learning based intervertebral disk classification combining shape and texture similarities.
Neurocomputing, 2013

MR prostate segmentation via distributed discriminative dictionary (DDD) learning.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

Image matching by fast random sample consensus.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

2012
A review and prospect of readable machine proofs for geometry theorems.
J. Systems Science & Complexity, 2012

Robust Anatomical Correspondence Detection by Graph Matching with Sparsity Constraint.
Proceedings of the Medical Computer Vision. Recognition Techniques and Applications in Medical Imaging, 2012

2011
Chaos-Based Video Encryption Algorithms.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Video accessibility enhancement for hearing-impaired users.
TOMCCAP, 2011

A Novel Intelligent Technique for Recognition of Coke Optical Texture.
JSW, 2011

A transition rate transformation method for solving advection-dispersion equation.
J. Comput. Physics, 2011

A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions.
Appl. Soft Comput., 2011

Intervertebral Disc Shape Analysis with Geodesic Metric in Shape Space.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Distribution-Based Active Contour Model for Medical Image Segmentation.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling.
Journal of Multimedia, 2010

Searching for overlapping coalitions in multiple virtual organizations.
Inf. Sci., 2010

The SLDSRC Rate Control Scheme for H.264.
Proceedings of the Advances in Multimedia Modeling, 2010

2009
Video Security Algorithm Aiming at the Need of Privacy Protection.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Joint Scheme for Delay-Limited Video Transmission over Energy-Constrained MANET.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
A Novel Strategy of Coalition Evolvement Based on Interest.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Greedy Algorithm Solution to Agent Coalition for Single Task.
Proceedings of the Third International Conference on Natural Computation, 2007

A WSN Coalition Formation Algorithm Based on Ant Colony with Dual-Negative Feedback.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Comprehensive Evaluation of Agent Coalition Based on D-S Evidential Reasoning.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Particle Swarms Cooperative Optimization for Coalition Generation Problem.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

2004
Solution to Agent Coalition Problem using Improved Ant Colony Optimization Algorithm.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2001
Two quadrants control of the switched reluctance motor drive for application in electric drive bicycle.
Proceedings of the IEEE International Conference on Systems, 2001


  Loading...