Rong Jiang

According to our database1, Rong Jiang authored at least 54 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy.
Entropy, 2019

A Study of the Needs and Attitudes of Elderly People and Their Caregivers with Regards to Assistive Technologies.
Proceedings of the Human Aspects of IT for the Aged Population. Design for the Elderly and Technology Acceptance, 2019

2018
Research on the measurement and evaluation of trusted cloud service.
Soft Comput., 2018

A Multi-Phase Coupled Oscillator Using Inductive Resonant Coupling and Modified Dual-Tank Techniques.
J. Solid-State Circuits, 2018

Multiple rank multi-linear twin support matrix classification machine.
Journal of Intelligent and Fuzzy Systems, 2018

Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain.
I. J. Network Security, 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Generation Comp. Syst., 2018

Indoor robot localization combining feature clustering with wireless sensor network.
EURASIP J. Wireless Comm. and Networking, 2018

A 1.8 GHz-2.4 GHz SAW-Less Reconfigurable Receiver Frontend RFIC in 65nm CMOS RF SOI.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

A Research About Trustworthiness Metric Method of SaaS Services Based on AHP.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Mobile VR Game Design for Stroke Rehabilitation.
Proceedings of the Cross-Cultural Design. Applications in Cultural Heritage, Creativity and Social Development, 2018

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A Tightly Coupled Positioning Solution for Land Vehicles in Urban Canyons.
J. Sensors, 2017

A novel approach to wavelet selection and tree kernel construction for diagnosis of rolling element bearing fault.
J. Intelligent Manufacturing, 2017

Neural Network Based Web Log Analysis for Web Intrusion Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A low phase noise 8.8 GHz VCO based on ISF manipulation and dual-tank technique.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

A Framework to Construct Knowledge Base for Cyber Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Weighted composite quantile regression for single-index models.
J. Multivariate Analysis, 2016

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Security and Communication Networks, 2015

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Networking and Applications, 2015

The Memetic algorithm for the optimization of urban transit network.
Expert Syst. Appl., 2015

A Novel Risk Metric for Staff Turnover in a Software Project Based on Information Entropy.
Entropy, 2015

Research and Measurement of Software Complexity Based on Wuli, Shili, Renli (WSR) and Information Entropy.
Entropy, 2015

Low noise coupling techniques for multi-phase oscillators.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
Performance Analysis of Cognitive Radio Spectrum Access with Different Primary User Access Schemes.
Wireless Personal Communications, 2014

An Information-Entropy-based Risk Measurement Method of Software Development Project.
J. Inf. Sci. Eng., 2014

A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM).
Entropy, 2014

MMACS: A multi-authority cloud access scheme with mixed access structure.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks.
TIIS, 2013

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications.
IJDSN, 2013

Two step composite quantile regression for single-index models.
Computational Statistics & Data Analysis, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Influence of interlayer on the performance of phosphorescent white organic light-emitting devices.
Displays, 2012

2011
Detection and 2-Dimensional display of short tandem repeats based on signal decomposition.
IJDMB, 2011

Feasibility Analysis on Tax Incentives Policy of Venture Capital.
Proceedings of the Advances in Computer Science, 2011

2009
An Evolving Neural Network for Authentic Emotion Classification.
Proceedings of the Fifth International Conference on Natural Computation, 2009

An Approach to Analysis and Measurement of the Stability of Web Community Based on Dissipative Structure Theory and Information Entropy.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Segmentation of short human exons based on spectral features of double curves.
IJDMB, 2008

A cross-layer optical circuit provisioning framework for data intensive IP end hosts.
IEEE Communications Magazine, 2008

An Efficient Method for Chip-Level Statistical Capacitance Extraction Considering Process Variations with Spatial Correlation.
Proceedings of the Design, Automation and Test in Europe, 2008

2007
Wavelet-Based Salient Regions and their Spatial Distribution for Image Retrieval.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2005
EPEEC: comprehensive SPICE-compatible reluctance extraction for high-speed interconnects above lossy multilayer substrates.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2005

Efficient statistical capacitance variability modeling with orthogonal principle factor analysis.
Proceedings of the 2005 International Conference on Computer-Aided Design, 2005

ICCAP: a linear time sparse transformation and reordering algorithm for 3D BEM capacitance extraction.
Proceedings of the 42nd Design Automation Conference, 2005

Comprehensive frequency dependent interconnect extraction and evaluation methodology.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

2004
Realizable Reduction for Electromagnetically Coupled RLMC Interconnects.
Proceedings of the 2004 Design, 2004

SCORE: SPICE COmpatible Reluctance Extraction.
Proceedings of the 2004 Design, 2004

EPEEC: a compact reluctance based interconnect model considering lossy substrate eddy currents.
Proceedings of the IEEE 2004 Custom Integrated Circuits Conference, 2004

2003
PODEA: Power delivery efficient analysis with realizable model reduction.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

1999
Time-Series Prediction with Cloud Models in DMKD.
Proceedings of the Methodologies for Knowledge Discovery and Data Mining, 1999


  Loading...