Jigang Liu

According to our database1, Jigang Liu authored at least 67 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Semantic Disentanglement Adversarial Hashing for Cross-Modal Retrieval.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

2023
An Ontology-Based Framework for Medical IoT Forensic Evidence.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Dual-level contrastive learning network for generalized zero-shot learning.
Vis. Comput., 2022

Extending the UTAUT2 Model with a Privacy Calculus Model to Enhance the Adoption of a Health Information Application in Malaysia.
Informatics, 2022

Triple Disentangling Network for Unsupervised Domain Adaptation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

An Enhanced RSSI-based Framework for Localization of Bluetooth Devices.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

MCS: An In-battle Commentary System for MOBA Games.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2020
Towards a Holistic Approach to Medical IoT Forensics.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

A Comparative Study of the Academic Programs between Informatics/BioInformatics and Data Science in the U.S.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Generating Orthogonal Voronoi Treemap for Visualization of Hierarchical Data.
Proceedings of the Advances in Computer Graphics, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Gaze Estimation Using Residual Neural Network.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Free-Head Appearance-Based Eye Gaze Estimation on Mobile Devices.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

Embedding Data Science into Computer Science Education.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

2018
Message from the CFSE 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A reputation-based model for mobile agent migration for information search and retrieval.
Int. J. Inf. Manag., 2017

Malware Behavior Ontology for Digital Evidence.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Designing an Undergraduate Minor Program in E-Discovery.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

2016
Ten-Year Synthesis Review: A Baccalaureate Program in Computer Forensics.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Baccalaureate programs in computer forensics.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Message from the CFSE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Conditional bayesian filtering for robot navigation and human tracking
PhD thesis, 2015

3D Human motion tracking by exemplar-based conditional particle filter.
Signal Process., 2015

Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015

Mobile Agent-Based Service Migration.
Proceedings of the 12th International Conference on Information Technology, 2015

Message from the CFSE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

An Adaptive Learning Model for k-Anonymity Location Privacy Protection.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Conditional simultaneous localization and mapping: A robust visual SLAM system.
Neurocomputing, 2014

Analyzing the Vulnerabilities in GWT Code and Applications.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Performance analysis of javascript injection detection techniques.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2014

A novel approach to evaluating similarity in computer forensic investigations.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2014

Secure streaming forensic data transmission for trusted cloud.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

2013
A New Security Metric for SOA Implementations.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2011
Development of digital forensics practice and research in Japan.
Wirel. Commun. Mob. Comput., 2011

2010
Advanced Hough Transform Using A Multilayer Fractional Fourier Method.
IEEE Trans. Image Process., 2010

Conditional Localization and Mapping Using Stereo Camera.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

2009
A Turing Machine-Based Model for Computer Forensic Reconstruction.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

A Comparative Study of Forensic Science and Computer Forensics.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Teach real-time embedded system online with real hands-on labs.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

Resource Allocation Optimization for GSD Projects.
Proceedings of the Computational Science and Its Applications, 2009

Computer Forensics in Japan: A Preliminary Study.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Web document categorization by Support Vector Clustering.
Proceedings of the IEEE International Conference on Systems, 2008

APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Enhancing malware detection in an IM environment.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

Towards a forensic-aware file system.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

Intrusion Resistant SOAP Messaging with IAPF.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Book Review: Computer Forensics: Principles and Practices.
J. Digit. Forensics Secur. Law, 2007

Secure Web Applications: A Systematic Approach.
Proceedings of the 2007 International Conference on Security & Management, 2007

A Framework for Enhancing Web Services Security.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Recursion detection testing on software components.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Asynchronous Callback in Web Services.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Recursion Detection Testing on Software Components.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Incremental, Spiral, Topic-Driven Approach -- Designing labs and projects for a Web technology course.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

Decoupling Metrics for Services Composition.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
Computer forensics programs in higher education: a preliminary study.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005

Know What to Learn and Learn How to Learn.
Proceedings of The 2005 International Conference on Frontiers in Education: Computer Science and Computer Engineering, 2005

2004
Design Patterns for Web Services.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

A New Framework for Teaching Web Technology.
Proceedings of the International Conference on Internet Computing, 2004

2003
A direct up-conversion transmitter architecture for TD-SCDMA handset.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2002
A Parallel Prefix Convex Hill Algorithm Using MasPar.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

1999
Performance Evaluation of Parallel Computational Geometry Algorithms on Maspar.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1996
Planar Convex Hull Algorithms on Linear Arrays.
Parallel Algorithms Appl., 1996

1995
A Generalized Approach for Computing Convex Hulls Using Linear Arrays.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

1992
A simplified optimal algorithm for constructing the convex hull of a simple polygon.
Proceedings of the 30th Annual Southeast Regional Conference, 1992


  Loading...