Jianping Yin

According to our database1, Jianping Yin authored at least 174 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Heterogeneous Metric Learning of Categorical Data with Hierarchical Couplings.
IEEE Trans. Knowl. Data Eng., 2018

Model-aware categorical data embedding: a data-driven approach.
Soft Comput., 2018

Incremental multiple kernel extreme learning machine and its application in Robo-advisors.
Soft Comput., 2018

Hyperparameter selection of one-class support vector machine by self-adaptive data shifting.
Pattern Recognition, 2018

Foreword to the special issue on recent advances on pattern recognition and artificial intelligence.
Neural Computing and Applications, 2018

A fast and accurate method for detecting fingerprint reference point.
Neural Computing and Applications, 2018

Large-scale k-means clustering via variance reduction.
Neurocomputing, 2018

Financial time series prediction using ℓ2, 1RF-ELM.
Neurocomputing, 2018

Video anomaly detection and localization by local motion based joint video representation and OCELM.
Neurocomputing, 2018

DMP-ELMs: Data and model parallel extreme learning machines for large-scale learning tasks.
Neurocomputing, 2018

Distributed and asynchronous Stochastic Gradient Descent with variance reduction.
Neurocomputing, 2018

Mechanical amelioration to improve hexapod robot speed.
IJES, 2018

Traffic flow detection method based on vertical virtual road induction line.
IJES, 2018

Boosting landmark retrieval baseline with burstiness detection.
IET Computer Vision, 2018

Incomplete Multiview Clustering via Late Fusion.
Comp. Int. and Neurosc., 2018

Group Recommendation Based on Financial Social Network for Robo-Advisor.
IEEE Access, 2018

Intensity Filtering and Group Fusion for Accurate Mobile Place Recognition.
IEEE Access, 2018

Multiple Kernel Clustering With Global and Local Structure Alignment.
IEEE Access, 2018

Exploration of Human Activities Using Sensing Data via Deep Embedded Determination.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Design of Practical Experiences to Improve Student Understanding of Efficiency and Scalability Issues in High Performance Computing: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Detecting Abnormality without Knowing Normality: A Two-stage Approach for Unsupervised Video Abnormal Event Detection.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Fine-Grained Segmentation Using Hierarchical Dilated Neural Networks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Localized Incomplete Multiple Kernel k-means.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

A Joint Approach to Data Clustering and Robo-Advisor.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A framework of predicting drug resistance of lung tuberculosis by utilizing radiological images.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Multi-view Clustering with Noisy Views.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Deep Embedded Clustering with Data Augmentation.
Proceedings of The 10th Asian Conference on Machine Learning, 2018

Variance Reduced K-Means Clustering.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Deep Embedding for Determining the Number of Clusters.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
MST-GEN: An Efficient Parameter Selection Method for One-Class Extreme Learning Machine.
IEEE Trans. Cybernetics, 2017

Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images.
Multimedia Tools Appl., 2017

A highly efficient human activity classification method using mobile data from wearable sensors.
IJSNet, 2017

A model for real-time computation of fuselage-rotor interference.
IJMSSC, 2017

A change-point DDoS attack detection method based on half interaction anomaly degree.
IJAACS, 2017

Complete three-phase detection framework for identifying abnormal cervical cells.
IET Image Processing, 2017

Consensus Kernel K-Means Clustering for Incomplete Multiview Data.
Comp. Int. and Neurosc., 2017

Coupled Multiple Kernel Learning for Supervised Classification.
Computing and Informatics, 2017

Image-Based Video Retrieval Using Deep Feature.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Group Burstiness Weighting for Image Retrieval.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Landmark-Based Spectral Clustering with Local Similarity Representation.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

A Bi-directional Evolution Algorithm for Financial Recommendation Model.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Fusion of Global and Local Deep Representation for Effective Object Retrieval.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

SVRG with adaptive epoch size.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Improved Deep Embedded Clustering with Local Structure Preservation.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Deep Clustering with Convolutional Autoencoders.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Similarity search for image retrieval via local-constrained linear coding.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Optimal Neighborhood Kernel Clustering with Multiple Kernels.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

Multiple Kernel k-Means with Incomplete Kernels.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
CATS: Cooperative Allocation of Tasks and Scheduling of Sampling Intervals for Maximizing Data Sharing in WSNs.
TOSN, 2016

Walking to singular points of fingerprints.
Pattern Recognition, 2016

A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard.
IEEE Network, 2016

Absent extreme learning machine algorithm with application to packed executable identification.
Neural Computing and Applications, 2016

Applying a new localized generalization error model to design neural networks trained with extreme learning machine.
Neural Computing and Applications, 2016

Random Fourier extreme learning machine with ℓ2, 1-norm regularization.
Neurocomputing, 2016

MI-ELM: Highly efficient multi-instance learning based on hierarchical extreme learning machine.
Neurocomputing, 2016

A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks.
IJAACS, 2016

Automatic cytoplasm and nuclei segmentation for color cervical smear image using an efficient gap-search MRF.
Comp. in Bio. and Med., 2016

Video anomaly detection based on ULGP-OF descriptor and one-class ELM.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Multiple Kernel Clustering with Local Kernel Alignment Maximization.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Co-regularized kernel k-means for multi-view clustering.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Anomaly detection in crowded scenes by SL-HOF descriptor and foreground classification.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

A simple approach for unsupervised domain adaptation.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Appearance changes detection during tracking.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Characterization of bipolar information aggregation and decomposition.
Proceedings of the 12th International Conference on Natural Computation, 2016

Abnormal cervical cell detection based on an adaptive margin-based feature selection method.
Proceedings of the Ninth International Conference on Machine Vision, 2016

Ensemble One-Class Extreme Learning Machine Based on Overlapping Data Partition.
Proceedings of the Cognitive Systems and Signal Processing, 2016

Multiple Kernel k-Means Clustering with Matrix-Induced Regularization.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
An efficient radius-incorporated MKL algorithm for Alzheimer's disease prediction.
Pattern Recognition, 2015

A secure removable visible watermarking for BTC compressed images.
Multimedia Tools Appl., 2015

Multiple kernel extreme learning machine.
Neurocomputing, 2015

SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Absent Multiple Kernel Learning.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Global and Local Structure Preservation for Feature Selection.
IEEE Trans. Neural Netw. Learning Syst., 2014

Multiple Kernel Learning in the Primal for Multimodal Alzheimer's Disease Classification.
IEEE J. Biomedical and Health Informatics, 2014

A Fast Simple Optical Flow Computation Approach Based on the 3-D Gradient.
IEEE Trans. Circuits Syst. Video Techn., 2014

Research on virus detection technique based on ensemble neural network and SVM.
Neurocomputing, 2014

Boosting weighted ELM for imbalanced learning.
Neurocomputing, 2014

Counting Pedestrian with Mixed Features and Extreme Learning Machine.
Cognitive Computation, 2014

On Radius-Incorporated Multiple Kernel Learning.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2014

A binary feature selection framework in kernel spaces.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Spectral clustering-based local and global structure preservation for feature selection.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Rational models to improve performance of differential evolution for MOEA/D.
Proceedings of the 10th International Conference on Natural Computation, 2014

Constrained multi-objective evolutionary algorithm based on decomposition for environmental/economic dispatch.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Control and Automation, 2014

Sample-Adaptive Multiple Kernel Learning.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs.
IEEE Trans. Wireless Communications, 2013

An Adaptive Approach to Learning Optimal Neighborhood Kernels.
IEEE Trans. Cybernetics, 2013

An Efficient Approach to Integrating Radius Information into Multiple Kernel Learning.
IEEE Trans. Cybernetics, 2013

Nonlinear discriminant clustering based on spectral regularization.
Neural Computing and Applications, 2013

Local binary pattern (LBP) and local phase quantization (LBQ) based on Gabor filter for face representation.
Neurocomputing, 2013

Technologies for Decision Making and AI Applications.
Int. J. Intell. Syst., 2013

Extreme Learning Machines.
IEEE Intelligent Systems, 2013

Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

ILGA: An Improved Local Greedy Algorithm for Optimal Parameters Searches.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Cytoplasm and nucleus segmentation in cervical smear images using Radiating GVF Snake.
Pattern Recognition, 2012

Incorporation of radius-info can be simple with SimpleMKL.
Neurocomputing, 2012

ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones.
IEEE Communications Letters, 2012

Flow level detection and filtering of low-rate DDoS.
Computer Networks, 2012

Sampling Attack against Active Learning in Adversarial Environment.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Research on Virus Detection Technology Based on Ensemble Neural Network and SVM.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

GPU-accelerated Burrow-Wheeler Transform for genomic data.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Robust local tangent space alignment via iterative weighted PCA.
Neurocomputing, 2011

A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition.
Int. J. Comput. Intell. Syst., 2011

Nonlinear Discriminative Embedding for Clustering via Spectral Regularization.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

An Efficient Hybrid Approach to Correcting Errors in Short Reads.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

Fusion of Multiple Candidate Orientations in Fingerprints.
Proceedings of the Image Analysis and Recognition - 8th International Conference, 2011

PSAEC: An Improved Algorithm for Short Read Error Correction Using Partial Suffix Arrays.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

2010
RRED: robust RED algorithm to counter low-rate denial-of-service attacks.
IEEE Communications Letters, 2010

A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Cluster Preserving Embedding.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A composite fingerprint segmentation based on Log-Gabor filter and orientation reliability.
Proceedings of the International Conference on Image Processing, 2010

Associating Minutiae between Distorted Fingerprints Using Minimal Spanning Tree.
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010

2009
A Large Margin Classifier with Additional Features.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Dynamic Neighborhood Selection for Nonlinear Dimensionality Reduction.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

A Novel Method for Multibiometric Fusion Based on FAR and FRR.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

Adaptive Neighborhood Select Based on Local Linearity for Nonlinear Dimensionality Reduction.
Proceedings of the Advances in Computation and Intelligence, 4th International Symposium, 2009

DDoS Attack Detection Using IP Address Feature Interaction.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

Robust Local Tangent Space Alignment.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

DDoS Attack Detection Method Based on Linear Prediction Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
Proceedings of the Security Technology, 2009

A Max-Margin Learning Algorithm with Additional Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

DDoS Attack Detection Algorithm Using IP Address Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

2008
Active Learning with Misclassification Sampling Based on Committee.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2008

A Prediction Model of DoS Attack's Distribution Discrete Probability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Active Learning with Misclassification Sampling Using Diverse Ensembles Enhanced by Unlabeled Instances.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Graph-Based Active Learning Based on Label Propagation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Incremental Manifold Learning Algorithm Using PCA on Overlapping Local Neighborhoods for Dimensionality Reduction.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

A Preliminary Study of Coordinated Worm Networks.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Score based biometric template selection.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Fingerprint alignment using special ridges.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

On the Partition Cells Formed by Hyperspheres.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Score Based Biometric Template Selection and Update.
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008

2007
Two steps for fingerprint segmentation.
Image Vision Comput., 2007

Intelligent Detection Computer Viruses Based on Multiple Classifiers.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Model for Survivability of Wireless Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

An Active Learning Method Based on Most Possible Misclassification Sampling Using Committee.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Malicious Codes Detection Based on Ensemble Learning.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Towards a New Methodology for Estimating Available Bandwidth on Network Paths.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

2006
A systematic method for fingerprint ridge orientation estimation and image segmentation.
Pattern Recognition, 2006

A Gabor Filter Based Fingerprint Enhancement Scheme Using Average Frequency.
IJPRAI, 2006

Mining Maximum Frequent Access Patterns in Web Logs Based on Unique Labeled Tree.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Algorithms for Delay Constrained and Energy Efficiently Routing in Wireless Sensor Network.
Proceedings of the Wireless Algorithms, 2006

Excluding the Remaining Ridges of Fingerprint Image.
Proceedings of the VISAPP 2006: Proceedings of the First International Conference on Computer Vision Theory and Applications, 2006

A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Using RS and SVM to Detect New Malicious Executable Codes.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine.
Proceedings of the International Joint Conference on Neural Networks, 2006

Evolvable Viral Agent Modeling and Exploration.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Requirements of Quality of Service in Wireless Sensor Network.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

An Anonymous Digital Cash and Fair Payment Protocol Utilizing Smart Card in Mobile Environments.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Computational Model of Computer Worms Based on Persistent Turing Machines.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
Fingerprint matching based on global alignment of multiple reference minutiae.
Pattern Recognition, 2005

Fingerprint Minutiae Relationship Representation and Matching Based on Curve Coordinate System.
Int. J. Image Graphics, 2005

Distributed Active Measuring Link Bandwidth in IP Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Efficiently Passive Monitoring Flow Bandwidth.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Using Passive Measuring to Calibrate Active Measuring Latency.
Proceedings of the Information Networking, 2005

Quality Estimation of Fingerprint Image Based on Neural Network.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Passive Calibration of Active Measuring Latency.
Proceedings of the Networking, 2005

On the Placement of Active Monitor in IP Network.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Efficiently monitoring link bandwidth in IP networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On a Novel Filtering Mechanism for Capacity Estimation: Extended Version.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

An Approximation Algorithm for Weak Vertex Cover Problem in Network Management.
Proceedings of the Algorithmic Applications in Management, First International Conference, 2005

2004
Fingerprint Enhancement Using Circular Gabor Filter.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...