Junfeng Tian

Orcid: 0000-0002-7068-8002

According to our database1, Junfeng Tian authored at least 118 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sourcing strategies of manufacturers with customer returns and product design efforts.
Int. Trans. Oper. Res., May, 2024

MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024

STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things.
J. Supercomput., February, 2024

A novel image encryption algorithm based on coupled map lattices model.
Multim. Tools Appl., January, 2024

SLChain: A secure and low-storage pressure sharding blockchain.
Concurr. Comput. Pract. Exp., 2024

2023
CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication.
Comput. J., December, 2023

A Cooperative PoW and Incentive Mechanism for Blockchain in Edge Computing.
IEEE Internet Things J., October, 2023

Multi-modal multi-hop interaction network for dialogue response generation.
Expert Syst. Appl., October, 2023

An arbitrable outsourcing data audit scheme supporting credit reward and punishment and multi-user sharing.
J. Parallel Distributed Comput., August, 2023

Block verifiable dynamic searchable encryption using redactable blockchain.
J. Inf. Secur. Appl., June, 2023

CCECGP: causal consistency model of edge-cloud collaborative based on grouping protocol.
J. Supercomput., May, 2023

DCCP: a dependable committee consensus protocol for permissionless blockchain.
J. Supercomput., March, 2023

Semi-supervised graph learning framework for apicomplexan parasite classification.
Biomed. Signal Process. Control., March, 2023

TSBFT: A scalable and efficient leaderless byzantine consensus for consortium blockchain.
Comput. Networks, February, 2023

Achieving Human Parity on Visual Question Answering.
ACM Trans. Inf. Syst., 2023

RethinkingTMSC: An Empirical Study for Target-Oriented Multimodal Sentiment Classification.
CoRR, 2023

UReader: Universal OCR-free Visually-situated Language Understanding with Multimodal Large Language Model.
CoRR, 2023

mPLUG-DocOwl: Modularized Multimodal Large Language Model for Document Understanding.
CoRR, 2023

mPLUG-Owl: Modularization Empowers Large Language Models with Multimodality.
CoRR, 2023

ChatPLUG: Open-Domain Generative Dialogue System with Internet-Augmented Instruction Tuning for Digital Human.
CoRR, 2023

A differential privacy trajectory data storage and publishing scheme based on radix tree.
Concurr. Comput. Pract. Exp., 2023

Fine-grained assured insertion and deletion scheme based on onion encryption in cloud storage.
Concurr. Comput. Pract. Exp., 2023

LightPoW: A trust based time-constrained PoW for blockchain in internet of things.
Comput. Networks, 2023

CuckChain: A Cuckoo Rule Based Secure, High Incentive and Low Latency Blockchain System via Sharding.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Modeling Intra- and Inter-Modal Alignment with Optimal Transport for Visual Dialog.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

RethinkingTMSC: An Empirical Study for Target-Oriented Multimodal Sentiment Classification.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

UReader: Universal OCR-free Visually-situated Language Understanding with Multimodal Large Language Model.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

2022
Friendship links-based privacy-preserving algorithm against inference attacks.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Secure and effective assured deletion scheme with orderly overwriting for cloud data.
J. Supercomput., 2022

Horae: causal consistency model based on hot data governance.
J. Supercomput., 2022

An efficient auditing scheme with a novel structure for multiple replicas.
J. Supercomput., 2022

A causal consistency model based on grouping strategy.
J. Supercomput., 2022

Cloud data assured deletion scheme based on dynamic sliding window.
Peer-to-Peer Netw. Appl., 2022

Neighbor Correlated Graph Convolutional Network for multi-stage malaria parasite recognition.
Multim. Tools Appl., 2022

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.
Mob. Networks Appl., 2022

Sentiment-aware multimodal pre-training for multimodal sentiment analysis.
Knowl. Based Syst., 2022

Should banks offer concessions? Lending rates for manufacturers' green products.
Int. J. Prod. Res., 2022

Hierarchical data partition defence against co-resident attacks.
Int. J. Inf. Comput. Secur., 2022

mPLUG: Effective and Efficient Vision-Language Learning by Cross-modal Skip-connections.
CoRR, 2022

An arbitrable multi-replica data auditing scheme based on smart contracts.
Concurr. Comput. Pract. Exp., 2022

PGCE: A distributed storage causal consistency model based on partial geo-replication and cloud-edge collaboration architecture.
Comput. Networks, 2022

Fine-grained interactive attention learning for semi-supervised white blood cell classification.
Biomed. Signal Process. Control., 2022

CAT-MNER: Multimodal Named Entity Recognition with Knowledge-Refined Cross-Modal Attention.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

mPLUG: Effective and Efficient Vision-Language Learning by Cross-modal Skip-connections.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Blockchain-Based Incentive and Arbitrable Data Auditing Scheme.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Multi-authoritative Users Assured Data Deletion Scheme in Cloud Computing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

PromptMNER: Prompt-Based Entity-Related Visual Clue Extraction and Integration for Multimodal Named Entity Recognition.
Proceedings of the Database Systems for Advanced Applications, 2022

Shifting More Attention to Visual Backbone: Query-modulated Refinement Networks for End-to-End Visual Grounding.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

WikiDiverse: A Multimodal Entity Linking Dataset with Diversified Contextual Topics and Entity Types.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
A dynamic acceleration method for remote sensing image processing based on CUDA.
Wirel. Networks, 2021

Research on Generic Optical Remote Sensing Products: A Review of Scientific Exploration, Technology Research, and Engineering Application.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection.
Secur. Commun. Networks, 2021

A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption.
Multim. Tools Appl., 2021

Achieving Human Parity on Visual Question Answering.
CoRR, 2021

Grid-VLP: Revisiting Grid Features for Vision-Language Pre-training.
CoRR, 2021

Data integrity auditing for secure cloud storage using user behavior prediction.
Comput. Secur., 2021

Multilevel and Spatially Heterogeneous Factors Influencing Poor Households' Income in a Frontier Minority Area in Northeast China.
Complex., 2021

A provably secure and public auditing protocol based on the bell triangle for cloud data.
Comput. Networks, 2021

Aircraft Detection for Remote Sensing Image Based on Bidirectional and Dense Feature Fusion.
Comput. Intell. Neurosci., 2021

MinD at SemEval-2021 Task 6: Propaganda Detection using Transfer Learning and Multimodal Fusion.
Proceedings of the 15th International Workshop on Semantic Evaluation, 2021

Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

BBregLocator: A Vulnerability Detection System Based on Bounding Box Regression.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
An Algorithm Based on Influence to Predict Invisible Relationship.
Wirel. Commun. Mob. Comput., 2020

BVDetector: A program slice-based binary code vulnerability intelligent detection system.
Inf. Softw. Technol., 2020

Software trustworthiness evaluation model based on a behaviour trajectory matrix.
Inf. Softw. Technol., 2020

Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks.
EURASIP J. Inf. Secur., 2020

Adjoin: A causal consistency model based on the adjacency list in a distributed system.
Concurr. Comput. Pract. Exp., 2020

Fine-grained assured data deletion scheme based on attribute association.
Comput. Secur., 2020

Cloud data integrity verification scheme for associated tags.
Comput. Secur., 2020

Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification.
IEEE Access, 2020

VVS: Fast Similarity Measuring of FoV-Tagged Videos.
IEEE Access, 2020

Virtual Machine Security Migration Strategy Based on the Edge Computing Environment.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

A Model Based on Program Slice and Deep Learning for Software Defect Prediction.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

SentiX: A Sentiment-Aware Pre-Trained Model for Cross-Domain Sentiment Analysis.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Multi-Domain Dialogue Acts and Response Co-Generation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage.
IEEE Access, 2019

Stern-Brocot-Based Non-Repudiation Dynamic Provable Data Possession.
IEEE Access, 2019

A Generalized Approach for Anomaly Detection From the Internet of Moving Things.
IEEE Access, 2019

UMC4M: A Verification Tool via Program Execution.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

Public Audit Scheme of Shared Data Based on Blockchain.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Attention Optimization for Abstractive Document Summarization.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wirel. Commun., 2018

Dynamic Trust Model Based on Extended Subjective Logic.
KSII Trans. Internet Inf. Syst., 2018

Date Hierarchical Storage Strategy for Data Disaster Recovery.
IEEE Access, 2018

ECNU at SemEval-2018 Task 12: An End-to-End Attention-based Neural Network for the Argument Reasoning Comprehension Task.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

An Adversarial Joint Learning Model for Low-Resource Language Semantic Textual Similarity.
Proceedings of the Advances in Information Retrieval, 2018

Load Balancing Method Based on a Performance and Power Ratio.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

A Multi-Task Learning Approach for Improving Product Title Compression with User Search Log Data.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
ECNU at SemEval-2017 Task 1: Leverage Kernel-based Traditional NLP features and Neural Networks to Build a Universal Model for Multilingual and Cross-lingual Semantic Textual Similarity.
Proceedings of the 11th International Workshop on Semantic Evaluation, 2017

iNLP at the NTCIR-13 STC-2 Task.
Proceedings of the 13th NTCIR Conference, 2017

2016
An e-commerce trust model based on expanded subjective logic.
Int. J. High Perform. Comput. Netw., 2016

A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism.
Int. J. Grid High Perform. Comput., 2016

A kind of dynamic software behavior trust model based on improved subjective logic.
Intell. Autom. Soft Comput., 2016

ECNU at SemEval-2016 Task 1: Leveraging Word Embedding From Macro and Micro Views to Boost Performance for Semantic Textual Similarity.
Proceedings of the 10th International Workshop on Semantic Evaluation, 2016

2015
Flexible dynamic weight decision scheme.
Intell. Decis. Technol., 2015

ECNU: Using Traditional Similarity Measurements and Word Embedding for Semantic Textual Similarity Estimation.
Proceedings of the 9th International Workshop on Semantic Evaluation, 2015

2012
Trusted Software Constitution Model Based on Trust Engine.
J. Softw., 2012

An Approach of Trustworthiness Evaluation of Software Behavior Based on Multidimensional Fuzzy Attributes.
J. Comput., 2012

2011
A Software Behavior Automaton Model Based on System Call and Context.
J. Comput., 2011

A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
Study on the Recommendation Trust Model Based on Encouragement and Punishment.
Proceedings of the International Conference on E-Business and E-Government, 2010

2009
A Reputation-Based Multi-Agent Model for Network Resource Selection.
Int. J. Commun. Netw. Syst. Sci., 2009

A Trust Model Based on the Multinomial Subjective Logic for P2P Network.
Int. J. Commun. Netw. Syst. Sci., 2009

A Trust Discovery Model Based on Weighted Closeness.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A weighted closeness-based trust combination model.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

APR: A Trust Model Based on Perceived Risk for P2P E-commerce System.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

A Study on the One-Time Pad Scheme Based Stern-Brocot Tree.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
A New Proactive Defense Model Based on Intrusion Deception and Traceback.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2005
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Study of Intrusion Signature Based on Honeypot.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Data Fusion Model of Intrusion Detection-IDSFP.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A New Active DDoS Defense System Based on Automatic Learning.
Proceedings of the Advances in Computer Science, 2005


  Loading...