Jinquan Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
ICPS: Real-Time Resource Configuration for Cloud Serverless Functions Considering Affinity.
CoRR, April, 2025

Scheduling ensemble workflows on hybrid resources in IaaS clouds.
Computing, January, 2025

ServlessSimPro: A comprehensive serverless simulation platform.
Future Gener. Comput. Syst., 2025

FlatD: Protecting Deep Neural Network Program from Reversing Attacks.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2025

2024
Scheduling Workflows With Limited Budget to Cloud Server and Serverless Resources.
IEEE Trans. Serv. Comput., 2024

A Novel Scheduling Approach for Spark Workflow Tasks With Deadline and Uncertain Performance in Multi-Cloud Networks.
IEEE Trans. Cloud Comput., 2024

Bridge substructure damage morphology identification based on the underwater sonar point cloud data.
Adv. Eng. Informatics, 2024

Reinforcement Learning Based Memory Configuration for Linear Dynamic Function Chains.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance Uncertainty.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Scheduling Workflow Instances to Servers and Serverless Functions in Cloud/Edge Data Centers.
Proceedings of the Service Science - CCF 16th International Conference, 2023

LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2022
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Cross-Chain Research Based on Verifiable Ring Signatures.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain-Based Efficient Incentive Mechanism in Crowdsensing.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Multi-Queue Request Scheduling for Profit Maximization in IaaS Clouds.
IEEE Trans. Parallel Distributed Syst., 2021

Dissolved Gas Analysis for Transformer Fault Based on Learning Spiking Neural P System with Belief AdaBoost.
Int. J. Unconv. Comput., 2021

Clustering Collision Power Attack on RSA-CRT.
Comput. Syst. Sci. Eng., 2021

A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
Comput. Syst. Sci. Eng., 2021

Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Estimation of Stresses in Concrete by Using Coda Wave Interferometry to Establish an Acoustoelastic Modulus Database.
Sensors, 2020

Condition Evaluation of an Existing T-Beam Bridge Based on Neutral Axis Variation Monitored with Ultrasonic Coda Waves in a Network of Sensors.
Sensors, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking.
J. Inf. Process. Syst., 2019

Robust Audio Watermarking Algorithm Based on Moving Average and DCT.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bridge Apparent Damage Detection System Based on Deep Learning.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Bridge Moving Load Recognition Based on Deep Learning.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

2017
Robust Audio Watermarking Algorithm Based on Moving Average and DCT.
CoRR, 2017

A Synchronization Algorithm Based on Moving Average for Robust Audio Watermarking Scheme.
CoRR, 2017

2015
Audio dual watermarking scheme for copyright protection and content authentication.
Int. J. Speech Technol., 2015

2007
A Multi-agent Negotiation Protocol Based on Extended Case Based Reasoning.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...