Jingjing Hu

Orcid: 0009-0008-9332-1992

According to our database1, Jingjing Hu authored at least 60 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph-Based Covert Transaction Detection and Protection in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing.
J. Electr. Comput. Eng., 2024

Unified Static and Dynamic Network: Efficient Temporal Filtering for Video Grounding.
CoRR, 2024

2023
Microservice combination optimisation based on improved gray wolf algorithm.
Connect. Sci., December, 2023

Estimate the incubation period of coronavirus 2019 (COVID-19).
Comput. Biol. Medicine, May, 2023

Temperature and Relative Humidity Profile Retrieval from Fengyun-3D/VASS in the Arctic Region Using Neural Networks.
Remote. Sens., March, 2023

Transfer subspace learning via label release and contribution degree distinction.
Inf. Sci., 2023

Cross-Modal Attentive Recalibration and Dynamic Fusion for Multispectral Pedestrian Detection.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

MergeTree: a Tree Model with Merged Nodes for Threat Induction.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
Towards robust and stealthy communication for wireless intelligent terminals.
Int. J. Intell. Syst., December, 2022

Detecting Fine-Grained Airplanes in SAR Images With Sparse Attention-Guided Pyramid and Class-Balanced Data Augmentation.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Generalized conjugate direction algorithm for solving generalized coupled Sylvester transpose matrix equations over reflexive or anti-reflexive matrices.
J. Frankl. Inst., 2022

tTree+: A Threat Tree Model for Representing Complex Semantics.
Proceedings of the IEEE International Conference on Trust, 2022

Attention-Guided Multi-modal and Multi-scale Fusion for Multispectral Pedestrian Detection.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

Vision Detection System Based on Mixed Recognition of Gesture and Speech.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

timeTree: How to Represent Time Sequence in a Threat Tree.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A feature selection method combining neighborhood rough set and butterfly optimization algorithm.
Proceedings of the 8th IEEE International Conference on Cloud Computing and Intelligent Systems, 2022

2021
Temperature and Relative Humidity Profile Retrieval from Fengyun-3D/HIRAS in the Arctic Region.
Remote. Sens., 2021

An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.
Mob. Networks Appl., 2021

An Efficient Bounded Model Checking Approach for Web Service Composition.
Mob. Networks Appl., 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things.
Int. J. Intell. Syst., 2021

Teaching Evaluation System by use of Machine Learning and Artificial Intelligence Methods.
Int. J. Emerg. Technol. Learn., 2021

Multi-depot vehicle routing problem with cooperative transportation in terminal distribution.
Int. J. Appl. Decis. Sci., 2021

Feature Selection Based on Gain Ratio in Hybrid Incomplete Information Systems.
Proceedings of the 16th International Conference on Intelligent Systems and Knowledge Engineering, 2021

Code Decoupling Execution Isolating Based on TF Card Firmware Extension.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Software Misconfiguration Troubleshooting Based on State Analysis.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints.
Future Gener. Comput. Syst., 2020

Towards cross-task universal perturbation against black-box object detectors in autonomous driving.
Comput. Networks, 2020

I-HMM-Based Multidimensional Network Security Risk Assessment.
IEEE Access, 2020

Revisiting motion-based respiration measurement from videos.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Design of Timing Charging and Discharging System for Pneumatic or Hydraulic Pressure Device Based on STM32.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

2019
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT.
J. Netw. Comput. Appl., 2019

Attacking Black-Box Image Classifiers With Particle Swarm Optimization.
IEEE Access, 2019

Network Security Situation Prediction Based on MR-SVM.
IEEE Access, 2019

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019

Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An Improved Prediction Model for the Network Security Situation.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

An Improved Assessment Method for the Network Security Risk.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Illumination Robust Heart-rate Extraction from Single-wavelength Infrared Camera Using Spatial-channel Expansion.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Evading PDF Malware Classifiers with Generative Adversarial Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Research on QoS service composition based on coevolutionary genetic algorithm.
Soft Comput., 2018

Towards Android Application Protection via Kernel Extension.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Research on Power Allocation of Network Coding in Vehicle Networking.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
A GPU-based multi-resolution approach to iterative reconstruction algorithms in x-ray 3D dual spectral computed tomography.
Neurocomputing, 2016

Proactive service selection based on acquaintance model and LS-SVM.
Neurocomputing, 2016

Higher-order DWA in bandpass delta-sigma modulators and its implementation.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Research on equivalent simplified model of multi-level vertical isolated structure under heavy-haul train vibration.
Proceedings of the IEEE International Conference on Intelligent Transportation Engineering, 2016

SeqMaker: A next generation sequencing simulator with variations, sequencing errors and amplification bias integrated.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
Automatic filter calibration for bandpass delta-sigma modulators.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015

Bitstream switching rate based calibration of delta-sigma modulators.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2012
Behavioral Compatibility Analysis for Context-independent Service Substitution.
Proceedings of the Seventh ChinaGrid Annual Conference, ChinaGrid 2012, Beijing, 2012

2009
GPU-Based 3D Cone-Beam CT Image Reconstruction for Large Data Volume.
Int. J. Biomed. Imaging, 2009

2008
A Context-aware Computational Trust Model for Multi-agent Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Three-Stage Amplifier with Quenched Multipath Frequency Compensation for All Capacitive Loads.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

A Context-Aware Trust Establishment and Mapping Framework for Web Applications.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Building Detection and Recognition for an Automated Tour Guide.
Proceedings of the IEEE International Conference on Systems, 2006

2002
Mining Protein Contact Maps.
Proceedings of the 2nd ACM SIGKDD Workshop on Data Mining in Bioinformatics (BIOKDD 2002), 2002


  Loading...