Kun Jia
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
ICESat-2 Satellite LiDAR Bathymetry Extraction Algorithm Based on Cubic Function Fitting Prediction Interval Along Track Segments.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025
A Novel Method for Extending Dynamic Range in Time-Division-Multiplexing Linear Sagnac Systems Based on Time Slot Insertion.
IEEE Access, 2025
2024
A Denoising Methodology for Detecting ICESat-2 Bathymetry Photons Based on Quasi Full Waveform.
IEEE Trans. Geosci. Remote. Sens., 2024
Research on energy-saving relay selection algorithm based on olive forwarding area in IoT.
Comput. Networks, 2024
High-Performance Extrinsic Fabry-Perot Fiber Optic Acoustic Sensor Based on Au/PI Composite Film.
IEEE Access, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
2023
Using remote sensing data to evaluate the ecological restoration in Taiyuan from the SDGs perspective.
Int. J. Digit. Earth, December, 2023
2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
2021
The Influence of Perceived Trust and Time Moderator on the Purchase Intention of Consumers in the Context of E-Commerce Livestreaming.
Proceedings of the 20th Wuhan International Conference on E-Business, 2021
2020
Estimation of Winter Wheat Production Potential Based on Remotely-Sensed Imagery and Process-Based Model Simulations.
Remote. Sens., 2020
Thinking Vs Doing Uncertainty of Design Thinking Tools in Facilitating Maker Workshops.
Proceedings of the Chinese CHI 2020: The eighth International Workshop of Chinese CHI, 2020
2019
IET Inf. Secur., 2019
PolSAR Image Speckle Reduction Based on Classification of Similarity Features Between Coherency Matrices.
IEEE Access, 2019
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources.
Proceedings of the Science of Cyber Security - First International Conference, 2018
2016
Peer-to-Peer Netw. Appl., 2016
Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012