Jie Ling

Orcid: 0000-0001-7736-1566

Affiliations:
  • Guangdong University of Technology, School of Computer Science, China


According to our database1, Jie Ling authored at least 35 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pseudo-Supervised Low-Light Image Enhancement With Mutual Learning.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

2023
Improving the transferability of adversarial samples with channel switching.
Appl. Intell., December, 2023

An Effective Co-Support Guided Analysis Model for Multi-Contrast MRI Reconstruction.
IEEE J. Biomed. Health Informatics, May, 2023

Unrolling Rain-guided Detail Recovery Network for Single Image Deraining.
Virtual Real. Intell. Hardw., February, 2023

A synergetic image encryption method based on discrete fractional random transform and chaotic maps.
Multim. Tools Appl., 2023

Local and global knowledge distillation with direction-enhanced contrastive learning for single-image deraining.
Knowl. Based Syst., 2023

Anomaly Detection of IoT traffic Based on LSTM and Attention Mechanism.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

Research on Multi-level Location Privacy Protection for Mobile Crowd Sensing based on Blockchain.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

No Reference Image Quality Assessment Via Quality Difference Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Joint feedback and recurrent deraining network with ensemble learning.
Vis. Comput., 2022

White-box content camouflage attacks against deep learning.
Comput. Secur., 2022

C<sup>3</sup>Net: A Cross-Channel Cross-Scale and Cross-Stage Network for Single Image Super-Resolution.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating.
Secur. Commun. Networks, 2021

Semi-supervised learning approach for malicious URL detection via adversarial learning.
J. Intell. Fuzzy Syst., 2021

A new two-stage method for single image rain removal.
IET Image Process., 2021

An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit.
Comput. Electr. Eng., 2021

2020
A new encryption scheme for multivariate quadratic systems.
Theor. Comput. Sci., 2020

Single-image de-raining using low-rank matrix approximation.
Neural Comput. Appl., 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

2019
基于可撤销外包属性加密的二维码加密 (Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption).
计算机科学, 2019

A low-loss high-linearity SOI SP6T antenna switch using diode biasing method.
IEICE Electron. Express, 2019

Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems.
Comput. J., 2019

Automatic diagnosis of cardiac arrhythmia in electrocardiograms via multigranulation computing.
Appl. Soft Comput., 2019

BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks.
IEEE Access, 2019

MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Architecture considerations of LTE/WCDMA wideband power amplifier for efficiency improvement.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

An approach for quantitatively analyzing the genuine tripartite nonlocality of general three-qubit states.
Quantum Inf. Process., 2018

Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Gener. Comput. Syst., 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Gener. Comput. Syst., 2018

Fast Removal of Rain Streaks From a Single Image via a Shape Prior.
IEEE Access, 2018

2016
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images.
Signal Process. Image Commun., 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

2007
A New Certified Email Protocol.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Certified Email Delivery with Offline TTP.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...