Jun Shao

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Pairing-free public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces, March, 2024

Long-Time Speech Emotion Recognition Using Feature Compensation and Accentuation-Based Fusion.
Circuits Syst. Signal Process., February, 2024

MLDT: Multi-Level Decomposition for Complex Long-Horizon Robotic Task Planning with Open-Source Large Language Model.
CoRR, 2024

2023
Trajectory Optimization for Manipulation Considering Grasp Selection and Adjustment.
J. Intell. Robotic Syst., September, 2023

Non-transferable blockchain-based identity authentication.
Peer Peer Netw. Appl., May, 2023

A Sequential Electrospinning of a Coaxial and Blending Process for Creating Double-Layer Hybrid Films to Sense Glucose.
Sensors, April, 2023

Joint Wavelet Sub-Bands Guided Network for Single Image Super-Resolution.
IEEE Trans. Multim., 2023

A Transformer-based representation-learning model with unified processing of multimodal input for clinical diagnostics.
CoRR, 2023

Towards Safe and Aggressive Motion Generation for Dynamic Targets Pick-and-Place.
IROS, 2023

Vision-Based Categorical Object Pose Estimation and Manipulation.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Bab: A novel algorithm for training clean model based on poisoned data.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
Development and validation of an abnormality-derived deep-learning diagnostic system for major respiratory diseases.
npj Digit. Medicine, 2022

Adaptive Robust Invariant Extended Kalman filtering for Biped Robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

Research on the Impact of Digital Finance on China's Energy Efficiency Based on Big Data Analysis of Ant Group Finance.
Proceedings of the 7th International Conference on Information Systems Engineering, 2022

2021
Dimension-reduced semiparametric estimation of distribution functions and quantiles with nonignorable nonresponse.
Comput. Stat. Data Anal., 2021

RPLS-Net: pulmonary lobe segmentation based on 3D fully convolutional networks and multi-task learning.
Int. J. Comput. Assist. Radiol. Surg., 2021

RRT-GoalBias and Path Smoothing Based Motion Planning of Mobile Manipulators with Obstacle Avoidance.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

An Airborne Requirements Verification Method based on Requirement Elements using CRF.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

WP2-GAN: Wavelet-based Multi-level GAN for Progressive Facial Expression Translation with Parallel Generators.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
Feature screening for ultrahigh dimensional categorical data with covariates missing at random.
Comput. Stat. Data Anal., 2020

Research on the Knowledge Ontology Model of Attribute-oriented Airworthiness Review Compliance Activities.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

2017
Approximate conditional likelihood for generalized linear models with general missing data mechanism.
J. Syst. Sci. Complex., 2017

Preface - Special issue to celebrate the 30th anniversary of Journal of Systems Science and Complexity.
J. Syst. Sci. Complex., 2017

Too Much of a Good Thing: Downsides of a Large Network in Tech Firms and Mitigating Effects of Political Skills.
Proceedings of the International Conference on Information Systems, 2017

Prediction of Precipitation Based on Weighted Markov Chain in Dangshan.
Proceedings of the International Conference on High Performance Compilation, 2017

2016
Iterated imputation estimation for generalized linear models with missing response and covariate values.
Comput. Stat. Data Anal., 2016

2015
Preface to special issue on miscellaneous emerging security problems.
EAI Endorsed Trans. Security Safety, 2015

Big data challenges in China centre for resources satellite data and application.
Proceedings of the 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2015

A New Optimization Algorithm for HEVC.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Land cover change detection of Ezhou Huarong district based on multi-temporal ZY-3 satellite images.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Efficient verifiable multi-secret sharing scheme based on hash function.
Inf. Sci., 2014

2013
A novel compound regularization and fast algorithm for compressive sensing deconvolution.
Neurocomputing, 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptol. ePrint Arch., 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptol. ePrint Arch., 2013

2012
Investigation of Atrial Vulnerability by Analysis of the Sinus Node EG From Atrial Fibrillation Models Using a Phase Synchronization Method.
IEEE Trans. Biomed. Eng., 2012

Low-power programmable linear-phase filter designed for fully balanced bio-signal recording application.
IEICE Electron. Express, 2012

A novel single event upset hardened CMOS SRAM cell.
IEICE Electron. Express, 2012

Micro-film Marketing of Chinese Tourism Destinations via Social Media: The Case of Shaoxing.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

2011
Compounded Regularization and Fast Algorithm for Compressive Sensing Deconvolution.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

2009
CCA-Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
An evaluation of the Dental 3D Multimedia System on dentist-patient interactions: A report from China.
Int. J. Medical Informatics, 2008

Collaborative geospatial web services for multi-dimension remote sensing data.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2007
Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
Proceedings of the Progress in Cryptology, 2007

A Burst Scheduling Access Reordering Mechanism.
Proceedings of the 13st International Conference on High-Performance Computer Architecture (HPCA-13 2007), 2007

2006
Efficient ID-based Threshold Signature Schemes without Pairings.
IACR Cryptol. ePrint Arch., 2006

A traceable threshold signature scheme with multiple signing policies.
Comput. Secur., 2006

Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble.
Proceedings of the Knowledge Enterprise: Intelligent Strategies in Product Design, 2006

Non-gaussian statistical parameter modeling for SSTA with confidence interval analysis.
Proceedings of the 2006 International Symposium on Physical Design, 2006

2005
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Appl. Math. Comput., 2005

The Bit-reversal SDRAM Address Mapping.
Proceedings of the 9th International Workshop on Software and Compilers for Embedded Systems, Dallas, Texas, USA, September 29, 2005

1997
Weighted Jackknife-after-Bootstrap: A Heuristic Approach.
Proceedings of the 29th conference on Winter simulation, 1997

1988
A Knowledge-Based Query Optimization System.
Proceedings of the IFIP TC2/TC8/WG 2.6/WG 8.1 Working Conference on the Role of Artificial Intelligence in Databases and Information Systems, 1988


  Loading...