Jie Ling

According to our database1, Jie Ling authored at least 34 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Robust Trajectory Tracking Control for Variable Stiffness Actuators With Model Perturbations.
Front. Neurorobot., 2019

Learning Force-Relevant Skills from Human Demonstration.
Complexity, 2019

Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems.
Comput. J., 2019

Automatic diagnosis of cardiac arrhythmia in electrocardiograms via multigranulation computing.
Appl. Soft Comput., 2019

BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks.
IEEE Access, 2019

Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

2018
Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

An approach for quantitatively analyzing the genuine tripartite nonlocality of general three-qubit states.
Quantum Information Processing, 2018

Precision Contour tracking using feedback-feedforward Integrated control for a 2-DOF manipulation System.
I. J. Robotics and Automation, 2018

A Wireless Key Generation Algorithm for RFID System Based on Bit Operation.
I. J. Network Security, 2018

Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Generation Comp. Syst., 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Generation Comp. Syst., 2018

Fast Removal of Rain Streaks From a Single Image via a Shape Prior.
IEEE Access, 2018

Integrating Damping Control with Iterative Learning Control for Fast and Precise Scanning of Nanopositioners: A TITO Design*.
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

Robust Control of a Serial Variable Stiffness Actuator Based on Nonlinear Disturbance Observer (NDOB).
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

2017
Data-based double-feedforward controller design for a coupled parallel piezo nanopositioning stage.
J. Systems & Control Engineering, 2017

An Improved Privacy Protection Security Protocol Based on NFC.
I. J. Network Security, 2017

2016
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images.
Sig. Proc.: Image Comm., 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

Dispersive order of lifetimes of series systems in multiple-outlier Weibull models.
J. Systems Science & Complexity, 2016

A Semi-Automated Content Moderation Workflow for Humanitarian Situation Assessments.
IJISCRAM, 2016

A Human-is-the-Loop Approach for Semi-Automated Content Moderation.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

Combined Model-Free Decoupling Control and Double Resonant Control in Parallel Nanopositioning Stages for Fast and Precise Raster Scanning.
Proceedings of the Intelligent Robotics and Applications - 9th International Conference, 2016

Data-Driven Feedforward Decoupling Filter Design for Parallel Nanopositioning Stages.
Proceedings of the Intelligent Robotics and Applications - 9th International Conference, 2016

A position domain iteration learning control for contour tracking with application to a multi-axis motion testbed.
Proceedings of the 2016 American Control Conference, 2016

2015
An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings.
I. J. Network Security, 2015

A Position Domain Cross-Coupled Iteration Learning Control for Contour Tracking in Multi-axis Precision Motion Control Systems.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

2011
Information Hiding Algorithm Based on Stentiford Visual Attention Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
A motion location based video watermarking scheme using ICA to extract dynamic frames.
Neural Computing and Applications, 2009

Research and Implemention of File Protection System Based on Improved Role-Based Access Control.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Performance Comparison of Several Watermarking Methods Based on ICA and AQIM.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2007
A New Certified Email Protocol.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Certified Email Delivery with Offline TTP.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2005
A construction of binary constant-weight codes from algebraic curves over finite fields.
IEEE Trans. Information Theory, 2005


  Loading...