Limin Jia

According to our database1, Limin Jia authored at least 146 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Adaptive Optimization of Multi-Hop Communication Protocol for Linear Wireless Monitoring Networks on High-Speed Railways.
IEEE Trans. Intelligent Transportation Systems, 2019

Adaptive Multiclass Mahalanobis Taguchi System for Bearing Fault Diagnosis under Variable Conditions.
Sensors, 2019

Rolling Element Bearing Fault Diagnosis under Impulsive Noise Environment Based on Cyclic Correntropy Spectrum.
Entropy, 2019

Railway track fastener defect detection based on image processing and deep learning techniques: A comparative study.
Eng. Appl. of AI, 2019

A Novel Deeper One-Dimensional CNN With Residual Learning for Fault Diagnosis of Wheelset Bearings in High-Speed Trains.
IEEE Access, 2019

Short-Term Abnormal Passenger Flow Prediction Based on the Fusion of SVR and LSTM.
IEEE Access, 2019

Detecting suspicious package updates.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

Uncovering Information Flow Policy Violations in C Programs (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Bearing Fault Diagnosis Using Multiclass Self-Adaptive Support Vector Classifiers Based on CEEMD-SVD.
Wireless Personal Communications, 2018

Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks.
Wireless Communications and Mobile Computing, 2018

An Optimal Communications Protocol for Maximizing Lifetime of Railway Infrastructure Wireless Monitoring Network.
IEEE Trans. Industrial Informatics, 2018

Spectral Kurtosis Entropy and Weighted SaE-ELM for Bogie Fault Diagnosis under Variable Conditions.
Sensors, 2018

A Semi-Supervised Approach to Bearing Fault Diagnosis under Variable Conditions towards Imbalanced Unlabeled Data.
Sensors, 2018

Reliability assessment of complex electromechanical systems: A network perspective.
Quality and Reliability Eng. Int., 2018

Correlation between heterogeneity and vulnerability of subway networks based on passenger flow.
JRTPM, 2018

Intuitionistic Mechanism for weak components identification method of complex electromechanical system.
Journal of Intelligent and Fuzzy Systems, 2018

A Multi-Service Train-to-Ground Bandwidth Allocation Strategy Based on Game Theory and Particle Swarm Optimization.
IEEE Intell. Transport. Syst. Mag., 2018

A Risk-Based Maintenance Decision-Making Approach for Railway Asset Management.
International Journal of Software Engineering and Knowledge Engineering, 2018

Guest Editors' Introduction.
International Journal of Software Engineering and Knowledge Engineering, 2018

Multistate Reliability Evaluation of Bogie on High Speed Railway Vehicle Based on the Network Flow Theory.
International Journal of Software Engineering and Knowledge Engineering, 2018

Measuring Selection Diversity of Emergency Medical Service for Metro Stations: A Case Study in Beijing.
ISPRS Int. J. Geo-Information, 2018

Adaptive Diagnosis for Rotating Machineries Using Information Geometrical Kernel-ELM Based on VMD-SVD.
Entropy, 2018

Data Center Diagnostics with Network Provenance.
IEEE Data Eng. Bull., 2018

System Reliability Assessment Based on Failure Propagation Processes.
Complexity, 2018

Improved Robust Vehicle Detection and Identification Based on Single Magnetic Sensor.
IEEE Access, 2018

Efficient and Correct Test Scheduling for Ensembles of Network Policies.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Traffic Speed Estimation Using Mobile Phone Location Data Based on Longest Common Subsequence.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

A New Method for Lithological Dscrimination and Mapping by Using Aster Data in Dong Co Area, Northern Tibet.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Session-Typed Concurrent Contracts.
Proceedings of the Programming Languages and Systems, 2018

Knowledge-Based Security of Dynamic Secrets for Reactive Programs.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Real-time road traffic state prediction based on ARIMA and Kalman filter.
Frontiers of IT & EE, 2017

Speed Tracking Based Energy-Efficient Freight Train Control Through Multi-Algorithms Combination.
IEEE Intell. Transport. Syst. Mag., 2017

Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017

Distributed Provenance Compression.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Timing-Sensitive Noninterference through Composition.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Research on Topological Risk of Expressway Networks.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

A Sequent Calculus for Counterfactual Reasoning.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Traffic Vehicle Counting in Jam Flow Conditions Using Low-Cost and Energy-Efficient Wireless Magnetic Sensors.
Sensors, 2016

Traffic Safety Region Estimation Based on SFS-PCA-LSSVM: An Application to Highway Crash Risk Evaluation.
International Journal of Software Engineering and Knowledge Engineering, 2016

Fast EEMD Based AM-Correntropy Matrix and Its Application on Roller Bearing Fault Diagnosis.
Entropy, 2016

Doppler Shift Estimation for High-Speed Railway Scenario.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

Monitors and blame assignment for higher-order session types.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Simulation verification for go-Bayes analysis method based on RCM theory.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Research on Performance Degradation Assessment Method of Train Rolling Bearings under incomplete data.
Proceedings of the 22nd International Conference on Distributed Multimedia Systems, 2016

2015
A Space-Time Network-Based Modeling Framework for Dynamic Unmanned Aerial Vehicle Routing in Traffic Incident Monitoring Applications.
Sensors, 2015

Train re-scheduling based on an improved fuzzy linear programming model.
Kybernetes, 2015

An Online Quantified Safety Assessment Method for Train Service State Based on Safety Region Estimation and Hybrid Intelligence Technologies.
International Journal of Software Engineering and Knowledge Engineering, 2015

Study on the Accident-causing Model Based on Safety Region and Applications in China Railway Transportation System.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Automated verification of safety properties of declarative networking programs.
Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, 2015

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Method of Traffic Travel Status Segmentation Based on Position Trajectories.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

A Logic of Programs with Interface-Confined Code.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A vehicle re-identification algorithm based on multi-sensor correlation.
Journal of Zhejiang University - Science C, 2014

Trains Trouble Shooting Based on Wavelet Analysis and Joint Selection Feature Classifier.
Journal of Multimedia, 2014

Analysis of real-time system conflict based on fuzzy time Petri nets.
Journal of Intelligent and Fuzzy Systems, 2014

Fuzzy Temporal Logic Based Railway Passenger Flow Forecast Model.
Comp. Int. and Neurosc., 2014

Reliability Model Construction for Complex System Based on Common Cause Failure Network.
Adv. in MM, 2014

Continuous Tamper-Proof Logging Using TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Android taint flow analysis for app sets.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

Proof-based Verification of Software Defined Networks.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Building an inverse model of MR damper based on Dahl model.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Traffic semantic analysis based on mobile phone base station data.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Quantitatively analysis of train communication network based on multi-attribute utility function.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

A method of road traffic state acquisition based on wireless sensor networks.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Urban traffic commuting analysis based on mobile phone data.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

A Program Logic for Verifying Secure Routing Protocols.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Trip planning considering Last Trains Running.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Urban residents travel analysis based on mobile communication data.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
FSR: formal analysis and implementation toolkit for safe interdomain routing.
IEEE/ACM Trans. Netw., 2012

Reduction-based security analysis of Internet routing protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Access Point Research in Rail Train Safety Monitoring Sensor Network.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

Research on integrated monitoring and early warning platform for safe high speed railway operation.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

Modeling and Enhancing Android's Permission System.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Choquet Integral-OWA Based Adaptive Neural Fuzzy Inference System with Application.
International Journal of Computational Intelligence and Applications, 2011

On Adversary Models and Compositional Security.
IEEE Security & Privacy, 2011

FSR: formal analysis and implementation toolkit for safe inter-domain routing.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Maintaining distributed logic programs incrementally.
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011

Optimization of Vehicles Arrangement in Distribution Center.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 2, Beijing, China, 8, 2011

Some practical vehicle speed estimation methods by a single traffic magnetic sensor.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Fuzzy optimization model based tolerance approach to timetable rescheduling for high speed railway in China.
Proceedings of the FUZZ-IEEE 2011, 2011

Analyzing BGP Instances in Maude.
Proceedings of the Formal Techniques for Distributed Systems, 2011

Policy auditing over incomplete logs: theory, implementation and applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Improved Wavelet Neural Network Based on Hybrid Genetic Algorithm Applicationin on Fault Diagnosis of Railway Rolling Bearing.
JDCTA, 2010

Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Dependent types and program equivalence.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

An Operational Semantics for Network Datalog.
Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility, 2010

SN-UTIA: A sensor network for urban traffic information acquisition.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2010

Study on spacing optimization for traffic flow detector.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

Constraining Credential Usage in Logic-Based Access Control.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Optimization Model for Railway Freight Station Layout Based on Agent.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
xDomain: cross-border proofs of access.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Language support for processing distributed ad hoc data.
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009

Encoding information flow in Aura.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Road Traffic State Prediction with a Maximum Entropy Method.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Road Traffic Flow Prediction with a Time-Oriented ARIMA Model.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

An Experiment Study on Level of Service for the Regional Road Traffic.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Formally Verifiable Networking.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

Chinese Prosodic Word Prediction Using the Conditional Random Fields.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Mamdani Model Based Adaptive Neural Fuzzy Inference System and its Application in Traffic Level of Service Evaluation.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Integrating GIS with Cellular Automaton Model for Railway Transportation Safety System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
On conceptual and methodological issues in control of complex systems.
Proceedings of the IEEE International Conference on Systems, 2008

Modeling and Application of Urban Dynamic Region Traffic Model Based on Information Fusion.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Approach and Application of Transportation State Analysis.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Research on Emergency Management Information System of Qinghai-Tibet Railway Line.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A New Kind of PSO--Convergent Fuzzy Particle Swarm Optimization and Performance Analysis.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Approach of Fuzzy Classification Based on Hybrid Co-Evolution Algorithm.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Approach of Train Group Operation Conflict Prevention Reasoning Based on Fuzzy Time Petri Nets.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Application of Quantitative Analysis Method in Traffic Volume Prediction.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

AURA: a programming language for authorization and audit.
Proceedings of the Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, 2008

Evidence-Based Audit.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Modeling and Application of Railway Safety System through Object Petri Nets.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Integrating Software Requirements Analysis and Safety Control Approach.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Application Research on Track Safety Assessment Based on Artificial Neural Network.
Proceedings of the 2007 International Conference on Information & Knowledge Engineering, 2007

Uncertain Temporal Knowledge Reasoning of Train Group Operation Based on Extended Fuzzy-Timing Petri Nets.
Proceedings of the Fuzzy Information and Engineering, 2007

A Novel Self Accommodate Control Network.
Proceedings of the 2007 International Conference on Communications in Computing, 2007

2006
Construction of Fuzzy Classification System Based on Multi-objective Genetic Algorithm.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

A multi-agent model of railway intelligent safety guarantee system.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006

Expressing heap-shape contracts in linear logic.
Proceedings of the Generative Programming and Component Engineering, 2006

A Multi-objective Cooperative Coevolutionary Algorithm for Constructing Accurate and Interpretable Fuzzy systems.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

ILC: A Foundation for Automated Reasoning About Pointer Programs.
Proceedings of the Programming Languages and Systems, 2006

2005
Research on Software Requirement Analysis Method Based on Five-Key Elements Arrange.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Certifying Compilation for a Language with Stack Allocation.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005

A Study of Train Group Operation Multi-agent Model Oriented to RITS.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Research on train group operation model in RITS.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

Analysis of Temporal Uncertainty of Trains Converging Based on Fuzzy Time Petri Nets.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Design of Interpretable and Accurate Fuzzy Models from Data.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Application of Petri Net with Objects in Safety System Process Modeling.
Proceedings of The 2005 International Conference on E-Business, 2005

2004
Predictive Analysis Method Based on Railway Ticket Data Warehouse.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Research on fuzzy modeling based on modified fuzzy clustering and its application.
Proceedings of the 8th International Conference on Control, 2004

Modal Proofs as Distributed Programs (Extended Abstract).
Proceedings of the Programming Languages and Systems, 2004

2003
Reasoning about Hierarchical Storage.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Study on Essential Characteristics of RITS.
Proceedings of the 6th International Symposium on Autonomous Decentralized Systems (ISADS 2003), 2003


  Loading...