Kun Jia

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
ICESat-2 Satellite LiDAR Bathymetry Extraction Algorithm Based on Cubic Function Fitting Prediction Interval Along Track Segments.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025

A Novel Method for Extending Dynamic Range in Time-Division-Multiplexing Linear Sagnac Systems Based on Time Slot Insertion.
IEEE Access, 2025

2024
A Denoising Methodology for Detecting ICESat-2 Bathymetry Photons Based on Quasi Full Waveform.
IEEE Trans. Geosci. Remote. Sens., 2024

Research on energy-saving relay selection algorithm based on olive forwarding area in IoT.
Comput. Networks, 2024

High-Performance Extrinsic Fabry-Perot Fiber Optic Acoustic Sensor Based on Au/PI Composite Film.
IEEE Access, 2024

Towards LLM-Enhanced Digital Twins of Intelligent Computing Center.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

2023
Using remote sensing data to evaluate the ecological restoration in Taiyuan from the SDGs perspective.
Int. J. Digit. Earth, December, 2023

2022
A lightweight DDoS detection scheme under SDN context.
Cybersecur., December, 2022

Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

2021
The Influence of Perceived Trust and Time Moderator on the Purchase Intention of Consumers in the Context of E-Commerce Livestreaming.
Proceedings of the 20th Wuhan International Conference on E-Business, 2021

2020
Estimation of Winter Wheat Production Potential Based on Remotely-Sensed Imagery and Process-Based Model Simulations.
Remote. Sens., 2020

Thinking Vs Doing Uncertainty of Design Thinking Tools in Facilitating Maker Workshops.
Proceedings of the Chinese CHI 2020: The eighth International Workshop of Chinese CHI, 2020

2019
Dynamical model for individual defence against cyber epidemic attacks.
IET Inf. Secur., 2019

PolSAR Image Speckle Reduction Based on Classification of Similarity Features Between Coherency Matrices.
IEEE Access, 2019

Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources.
Proceedings of the Science of Cyber Security - First International Conference, 2018

2016
Practical blacklist-based anonymous authentication scheme for mobile crowd sensing.
Peer-to-Peer Netw. Appl., 2016

Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Achieving authorized and ranked multi-keyword search over encrypted cloud data.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2012
Detecting Spam in Chinese Microblogs - A Study on Sina Weibo.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012


  Loading...