Jiawei Su

Orcid: 0009-0003-9080-9590

According to our database1, Jiawei Su authored at least 16 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UEE-Delay Balanced Online Resource Optimization for Cooperative MEC-Enabled Task Offloading in Dynamic Vehicular Networks.
IEEE Internet Things J., April, 2024

2023
Dynamic Resource Allocation in Queue-Constrained and Delay-Sensitive Vehicular Networks.
IEEE Trans. Intell. Veh., October, 2023

Semantic Communication-Based Dynamic Resource Allocation in D2D Vehicular Networks.
IEEE Trans. Veh. Technol., August, 2023

Distributed robust power control in two-tier vehicle networks under uncertain channel environments.
Digit. Commun. Networks, June, 2023

Text-based Person Search via Virtual Attribute Learning.
Int. J. Softw. Informatics, 2023

2022
Consistent response for automated multilabel thoracic disease classification.
Concurr. Comput. Pract. Exp., 2022

2021
Resource Allocation in D2D Enabled Vehicular Communications: A Robust Stackelberg Game Approach Based on Price-Penalty Mechanism.
IEEE Trans. Veh. Technol., 2021

2020
Understanding the One Pixel Attack: Propagation Maps and Locality Analysis.
Proceedings of the Workshop on Artificial Intelligence Safety 2020 co-located with the 29th International Joint Conference on Artificial Intelligence and the 17th Pacific Rim International Conference on Artificial Intelligence (IJCAI-PRICAI 2020), 2020

2019
One Pixel Attack for Fooling Deep Neural Networks.
IEEE Trans. Evol. Comput., 2019

SFAD: Toward effective anomaly detection based on session feature similarity.
Knowl. Based Syst., 2019

Attacking convolutional neural network using differential evolution.
IPSJ Trans. Comput. Vis. Appl., 2019

2018
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Lightweight Classification of IoT Malware Based on Image Recognition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Evasion Attacks Against Statistical Code Obfuscation Detectors.
Proceedings of the Advances in Information and Computer Security, 2017

2015
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Real-time background subtraction-based video surveillance of people by integrating local texture patterns.
Signal Image Video Process., 2014


  Loading...