Jie Ling

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Privacy preserving technology for data sharing in cloud-assisted internet of medical things.
Clust. Comput., September, 2025

RGPNet: Learning a detail-preserved progressive model for single image deraining based on gradient prior.
Digit. Signal Process., 2025

Online detection of broken and impurity rates in half-feed peanut combine harvesters based on improved YOLOv8-Seg.
Comput. Electron. Agric., 2025

2024
FDT: Improving the transferability of adversarial examples with frequency domain transformation.
Comput. Secur., 2024

Multi-scale Mean Teacher for Unsupervised Cross-Modality Abdominal Organ Segmentation with Limited Annotations.
Proceedings of the Bioinformatics Research and Applications - 20th International Symposium, 2024

A Patient-Mounted Spherical Scissor-Like Remote Center of Motion Mechanism for Robotic-Assisted Lumbar Puncture.
Proceedings of the Intelligent Robotics and Applications - 17th International Conference, 2024

2023
BDN-DDI: A bilinear dual-view representation learning framework for drug-drug interaction prediction.
Comput. Biol. Medicine, October, 2023

Discriminative semi-supervised learning via deep and dictionary representation for image classification.
Pattern Recognit., August, 2023

2022
IRA-MRSNet: A Network Model for Change Detection in High-Resolution Remote Sensing Images.
Remote. Sens., 2022

Semi-Supervised Few-shot Learning via Multi-Factor Clustering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Attention-based label consistency for semi-supervised deep learning based image classification.
Neurocomputing, 2021

Semi-Supervised Learning by Exploiting Unlabeled Data Correlations in a Dual-Branch Network.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
Machine Learning based prediction of noncentrosymmetric crystal materials.
CoRR, 2020

2019
Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

2018
A Wireless Key Generation Algorithm for RFID System Based on Bit Operation.
Int. J. Netw. Secur., 2018

2017
一种改进的水平分布式环境下基于同态加密的隐私保护算法 (Improved Algorithm for Privacy-preserving Association Rules Mining on Horizontally Distributed Databases).
计算机科学, 2017

改进的隐藏访问结构的CP-ABE方案 (Improved Scheme of CP-ABE with Hidden Access Structure).
计算机科学, 2017

一种改进的基于标签部分ID的RFID密钥无线生成算法 (Improved RFID Key Wireless Generation Algorithm Based on Tag Part ID).
计算机科学, 2017

一种超轻量级移动射频识别的双向认证协议 (Ultra-lightweight Mutual Authentication Protocol for Mobile Radio Frequency Identification).
计算机科学, 2017

An Improved Privacy Protection Security Protocol Based on NFC.
Int. J. Netw. Secur., 2017

2016
一种低成本超轻量级RFID双向认证协议 (Low-cost Ultralightweight RFID Mutual-authentication Protocol).
计算机科学, 2016

一种改进的满足后向隐私的RFID认证协议 (Improved RFID Authentication Protocol with Backward Privacy).
计算机科学, 2016

Dispersive order of lifetimes of series systems in multiple-outlier Weibull models.
J. Syst. Sci. Complex., 2016

A Semi-Automated Content Moderation Workflow for Humanitarian Situation Assessments.
Int. J. Inf. Syst. Crisis Response Manag., 2016

A Human-is-the-Loop Approach for Semi-Automated Content Moderation.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

2015
一种WLAN信道传输干扰预测方法 (Transmission Interference Prediction Approach in WLAN Channel).
计算机科学, 2015

An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings.
Int. J. Netw. Secur., 2015

2013
Smart card fault attacks on elliptic curve cryptography.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013

2011
Information Hiding Algorithm Based on Stentiford Visual Attention Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
A motion location based video watermarking scheme using ICA to extract dynamic frames.
Neural Comput. Appl., 2009

Research and Implemention of File Protection System Based on Improved Role-Based Access Control.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Performance Comparison of Several Watermarking Methods Based on ICA and AQIM.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2005
A construction of binary constant-weight codes from algebraic curves over finite fields.
IEEE Trans. Inf. Theory, 2005


  Loading...