Jing Xu

Orcid: 0000-0001-8532-2241

Affiliations:
  • Nankai University, College of Information Technical Science, Tianjin, China (PhD 2003)


According to our database1, Jing Xu authored at least 62 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Transformer Fusion and Pixel-Level Contrastive Learning for RGB-D Salient Object Detection.
IEEE Trans. Multim., 2024

FINet: Frequency Injection Network for Lightweight Camouflaged Object Detection.
IEEE Signal Process. Lett., 2024

2023
A2SPPNet: Attentive Atrous Spatial Pyramid Pooling Network for Salient Object Detection.
IEEE Trans. Multim., 2023

A Fused Speech Enhancement Framework for Robust Speaker Verification.
IEEE Signal Process. Lett., 2023

Mask-and-Edge Co-Guided Separable Network for Camouflaged Object Detection.
IEEE Signal Process. Lett., 2023

Searching for the Fakes: Efficient Neural Architecture Search for General Face Forgery Detection.
CoRR, 2023

2022
MoADNet: Mobile Asymmetric Dual-Stream Networks for Real-Time and Lightweight RGB-D Salient Object Detection.
IEEE Trans. Circuits Syst. Video Technol., 2022

Visual Sentiment Classification via Low-Rank Regularization and Label Relaxation.
IEEE Trans. Cogn. Dev. Syst., 2022

Cross-Stage Multi-Scale Interaction Network for RGB-D Salient Object Detection.
IEEE Signal Process. Lett., 2022

Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning.
Multim. Tools Appl., 2022

Towards general object-based video forgery detection via dual-stream networks and depth information embedding.
Multim. Tools Appl., 2022

Sharing runtime permission issues for developers based on similar-app review mining.
J. Syst. Softw., 2022

RSKNet-MTSP: Effective and portable deep architecture for speaker verification.
Neurocomputing, 2022

FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection.
Neurocomputing, 2022

TriPINet: Tripartite Progressive Integration Network for Image Manipulation Localization.
CoRR, 2022

Delving into Universal Lesion Segmentation: Method, Dataset, and Benchmark.
Proceedings of the Computer Vision - ECCV 2022, 2022

CCSS: An Effective Object Detection System for Classroom Crowd Statistics.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Callback2Vec: Callback-aware hierarchical embedding for mobile application.
Inf. Sci., 2021

Efficient Asynchronous Semi-Stochastic Block Coordinate Descent Methods for Large-Scale SVD.
IEEE Access, 2021

Object-Based Video Forgery Detection via Dual-Stream Networks.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

MiniSeg: An Extremely Minimum Network for Efficient COVID-19 Segmentation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Early prediction for mode anomaly in generative adversarial network training: An empirical study.
Inf. Sci., 2020

Dilated residual networks with multi-level attention for speaker verification.
Neurocomputing, 2020

A simple saliency detection approach via automatic top-down feature fusion.
Neurocomputing, 2020

MiniSeg: An Extremely Minimum Network for Efficient COVID-19 Segmentation.
CoRR, 2020

Review Sharing via Deep Semi-Supervised Code Clone Detection.
IEEE Access, 2020

Autonomous Permission Recommendation.
IEEE Access, 2020

Vector-Based Attentive Pooling for Text-Independent Speaker Verification.
Proceedings of the Interspeech 2020, 2020

2019
基于复杂控制流的源代码内存泄漏静态检测 (Source Code Memory Leak Static Detection Based on Complex Control Flow).
计算机科学, 2019

Automatic Feature Exploration and an Application in Defect Prediction.
IEEE Access, 2019

Static Back-Stack Transition Analysis for Android.
IEEE Access, 2019

Systematic Comprehension for Developer Reply in Mobile System Forum.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Deep Review Sharing.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Method name suggestion with hierarchical attention networks.
Proceedings of the 2019 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2019

Deep Attentive Factorization Machine for App Recommendation Service.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Revisiting Multi-Level Feature Fusion: A Simple Yet Effective Network for Salient Object Detection.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Bi-Dimensional Representation of Patients for Diagnosis Prediction.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

AutoPer: Automatic Recommender for Runtime-Permission in Android Applications.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
A Projection-Based Approach for Memory Leak Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

High-Frequency Keywords to Predict Defects for Android Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A Combined Model for Time Series Prediction in Financial Markets.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2017
Lom: Discovering logic flaws within MongoDB-based web applications.
Int. J. Autom. Comput., 2017

GEMS: An Extract Method Refactoring Recommender.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

App genome: callback sequencing in Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

Marine Fishing Ground Prediction Based on Bayesian Decision Tree Model.
Proceedings of the 2017 International Conference on Management Engineering, 2017

An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration Test.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Application of Hidden Markov Model in SQL Injection Detection.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Automatic Construction of Callback Model for Android Application.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Improvement to Fault Localization Technique Based on Branch-Coverage Spectra.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness.
J. Syst. Softw., 2014

An automated testing approach for inter-application security in Android.
Proceedings of the 9th International Workshop on Automation of Software Test, 2014

2013
A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Interprocedural path-sensitive resource leaks detection for C programs.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

A fast adaptive binarization method for complex scene images.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

An improved binarization method using inter- and intra-block features for natural images.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Attack Model Based Penetration Test for SQL Injection Vulnerability.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

An Evaluation Model for Dependability of Internet-Scale Software on Basis of Bayesian Networks.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
A real-time command system based on hand gesture recognition.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
An Evaluation Framework for XML Engine on RDBMS.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010


  Loading...