Jingjing Guo

Orcid: 0000-0002-7249-5159

According to our database1, Jingjing Guo authored at least 97 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Swarm Self-supervised Hypergraph Embedding for Recommendation.
ACM Trans. Knowl. Discov. Data, May, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

Implicit function-based continuous representation for meticulous segmentation of cracks from high-resolution images.
Comput. Aided Civ. Infrastructure Eng., February, 2024

2023
TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks.
IEEE J. Sel. Areas Commun., November, 2023

Design of new metamaterial with negative permeability for efficient wireless power transfer.
Int. J. Circuit Theory Appl., November, 2023

Informativeness-guided active learning for deep learning-based façade defects detection.
Comput. Aided Civ. Infrastructure Eng., November, 2023

An incentive mechanism for horizontal federated learning based on principle of compound interest.
Phys. Commun., October, 2023

Automated clash resolution for reinforcement steel design in precast concrete wall panels via generative adversarial network and reinforcement learning.
Adv. Eng. Informatics, October, 2023

A Spatial Delay Domain-Based Prony Channel Prediction Method for Massive MIMO LEO Communications.
IEEE Syst. J., September, 2023

A metamaterial-incorporated wireless power transmission system for efficiency enhancement.
Int. J. Circuit Theory Appl., July, 2023

An Integrated Method for Road Crack Segmentation and Surface Feature Quantification under Complex Backgrounds.
Remote. Sens., March, 2023

Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., February, 2023

ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., February, 2023

Anomaly detection method for vehicular network based on collaborative deep support vector data description.
Phys. Commun., February, 2023

An efficient path delay variability model for wide-voltage-range digital circuits.
Sci. China Inf. Sci., February, 2023

Integrated mRNA sequence optimization using deep learning.
Briefings Bioinform., January, 2023

Cost-efficient edge caching and Q-learning-based service selection policies in MEC.
Wirel. Networks, 2023

Smooth Exploration System: A novel ease-of-use and specialized module for improving exploration of whale optimization algorithm.
Knowl. Based Syst., 2023

A novel structural damage detection method using a hybrid IDE-BP model.
Knowl. Based Syst., 2023

An improved heuristic mechanism ant colony optimization algorithm for solving path planning.
Knowl. Based Syst., 2023

Fault diagnosis based on residual-knowledge-data jointly driven method for chillers.
Eng. Appl. Artif. Intell., 2023

Gated Deeper Models are Effective Factor Learners.
CoRR, 2023

Multimodal collaborative graph for image recommendation.
Appl. Intell., 2023

SecCT: Secure and scalable count query models on encrypted genomic data.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

2022
Blockchain-assisted caching optimization and data storage methods in edge environment.
J. Supercomput., 2022

Resource management and switch migration in SDN-based multi-access edge computing environments.
J. Supercomput., 2022

ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning.
IEEE Trans. Ind. Informatics, 2022

Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain.
Secur. Commun. Networks, 2022

Molecular Mechanism of Ca<sup>2+</sup> in the Allosteric Regulation of Human Parathyroid Hormone Receptor-1.
J. Chem. Inf. Model., 2022

RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking.
IEEE Internet Things J., 2022

PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

A novel detail weighted histogram equalization method for brightness preserving image enhancement based on partial statistic and global mapping model.
IET Image Process., 2022

Multi-defect segmentation from façade images using balanced copy-paste method.
Comput. Aided Civ. Infrastructure Eng., 2022

Multi-level Temporal Relation Graph for Continuous Sign Language Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

An Accurate Channel Prediction Method for Massive MIMO-Based LEO Communications.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Fast Node Selection of Networked Radar Based on Transfer Reinforcement Learning.
Proceedings of the Intelligence Science IV, 2022

2021
Semi-Analytical Path Delay Variation Model With Adjacent Gates Decorrelation for Subthreshold Circuits.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Implementation of a Load Sensitizing Bridge Spherical Bearing Based on Low-Coherent Fiber-Optic Sensors Combined with Neural Network Algorithms.
Sensors, 2021

Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing.
Secur. Commun. Networks, 2021

Semantic manifold modularization-based ranking for image recommendation.
Pattern Recognit., 2021

BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks.
IEEE Internet Things J., 2021

Social space keyword query based on semantic trajectory.
Neurocomputing, 2021

Privacy-preserving multisource transfer learning in intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2021

Cramer-Rao lower bounds of target positioning estimate in netted radar system.
Digit. Signal Process., 2021

Semi-supervised learning based on convolutional neural network and uncertainty filter for façade defects classification.
Comput. Aided Civ. Infrastructure Eng., 2021

Double-Stream Segmentation Network with Temporal Self-attention for Deepfake Video Detection.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Counterfactual Embedding Learning for Debiased Recommendation<sup>†</sup>.
Proceedings of the Seventh IEEE International Conference on Multimedia Big Data, 2021

2020
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

Search within or beyond the industrial cluster? The effect of perceived competition and knowledge base tacitness on strategic location choices of external knowledge search.
Technol. Anal. Strateg. Manag., 2020

Fast replica recovery and adaptive consistency preservation for edge cloud system.
Soft Comput., 2020

Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing.
Secur. Commun. Networks, 2020

On-demand resource provision based on load estimation and service expenditure in edge cloud environment.
J. Netw. Comput. Appl., 2020

TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs.
IEEE Internet Things J., 2020

TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

Distributed secure estimation for cyber-physical systems with fading measurements and false data injection attacks.
Int. J. Syst. Sci., 2020

Achieving secure and convenient WLAN sharing in personal.
IET Inf. Secur., 2020

Workload forecasting based elastic resource management in edge cloud.
Comput. Ind. Eng., 2020

Façade defects classification from imbalanced dataset using meta learning-based convolutional neural network.
Comput. Aided Civ. Infrastructure Eng., 2020

Secure and Efficient Nearest Neighbor Query for an Outsourced Database.
IEEE Access, 2020

Points-of-Interest Recommendation Algorithm Based on LBSN in Edge Computing Environment.
IEEE Access, 2020

An Online Cold-Chain Monitoring System Powered by Miniature Smart Tag and Blockchain.
Proceedings of the 5th International Conference on Universal Village, 2020

Statistical Timing Model for Subthreshold Circuit with Correlated Variation Consideration.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

STULL: Unbiased Online Sampling for Visual Exploration of Large Spatiotemporal Data.
Proceedings of the 15th IEEE Conference on Visual Analytics Science and Technology, 2020

Distributed Kalman Consensus Filtering over Wireless Sensor Networks with FDI Attacks.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

2019
Soft and Stretchable Polymeric Optical Waveguide-Based Sensors for Wearable and Biomedical Applications.
Sensors, 2019

Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks, 2019

An Application Oriented Scan-to-BIM Framework.
Remote. Sens., 2019

An efficient privacy-preserving friendship-based recommendation system.
Int. J. Embed. Syst., 2019

LBOA: Location-Based Secure Outsourced Aggregation in IoT.
IEEE Access, 2019

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019

An Analytical Gate Delay Model in Near/Subthreshold Domain Considering Process Variation.
IEEE Access, 2019

Accurate and Efficient Interdependent Timing Model for Flip-Flop in Wide Voltage Region.
Proceedings of the 17th IEEE International New Circuits and Systems Conference, 2019

A Statistical Timing Model for CMOS Inverter in Near-threshold Region Considering Input Transition Time.
Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, 2019

A Statistical Timing Model for Low Voltage Design Considering Process Variation.
Proceedings of the International Conference on Computer-Aided Design, 2019

Fine-Grained Label Learning via Siamese Network for Cross-modal Information Retrieval.
Proceedings of the Computational Science - ICCS 2019, 2019

2D-Convolution Based Feature Fusion for Cross-Modal Correlation Learning.
Proceedings of the Computational Science - ICCS 2019, 2019

A Statistical Current and Delay Model Based on Log-Skew-Normal Distribution for Low Voltage Region.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Data-Driven Dynamic Modeling of the Acetylene Hydrogenation Process based on Nonlinear Slow Feature Analysis.
Proceedings of the 12th Asian Control Conference, 2019

2018
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Netw. Appl., 2018

The impact of knowledge attributes on technological learning routine within industrial clusters.
Int. J. Technol. Manag., 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

2017
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Analytical inverter chain's delay and its variation model for sub-threshold circuits.
IEICE Electron. Express, 2017

Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017

Reconstruction methodology for rational secret sharing based on mechanism design.
Sci. China Inf. Sci., 2017

Flexible Positioning of Source-Detector Arrays in 3D Visualization Platform for Monte Carlo Simulation of Light Propagation.
IEEE Access, 2017

Analytical hold timing fixing for sub-threshold circuit based on its lognormal distribution.
Proceedings of the 27th International Symposium on Power and Timing Modeling, 2017

Reputation Propagation for Web Service Composition: A Shapley Value Approach.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Improved face recognition result reranking based on shape contexts.
Proceedings of the 2016 International Conference on Intelligent Information Processing, 2016

2015
Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

2014
Internet addiction among Chinese adolescents: The effect of parental behavior and self-control.
Comput. Hum. Behav., 2014

2011
A Preliminary Study on the Use of the ICTs in the Tourism Industry in China.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
A review of Mobile Commerce consumers' behaviour research: consumer acceptance, loyalty and continuance (2000-2009).
Int. J. Mob. Commun., 2010

2009
Development of Fatigue Driving Detection Method Based on Fuzzy Control Logic.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009


  Loading...