Sheng Jiang

According to our database1, Sheng Jiang authored at least 68 papers between 2003 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 




Position-aware self-attention based neural sequence labeling.
Pattern Recognit., 2021

An Ultimate-Shannon-Limit-Approaching Gbps Throughput Encoder/Decoder System.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

A Survey on Recent Advances in Sequence Labeling from Deep Learning Models.
CoRR, 2020

Hardware Design of Concatenated Zigzag Hadamard Encoder/Decoder System With High Throughput.
IEEE Access, 2020

NEW IP Framework and Protocol for Future Applications.
Proceedings of the NOMS 2020, 2020

A New Approach to a Service Oriented Internet Protocol.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

RADIUS Attributes for Softwire Mechanisms Based on Address plus Port (A+P).
RFC, November, 2019

Enhancing Neural Sequence Labeling with Position-Aware Self-Attention.
CoRR, 2019

Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction.
IEEE Access, 2019

Definitions of Managed Objects for Mapping of Address and Port with Encapsulation (MAP-E).
RFC, December, 2018

Dynamic Host Configuration Protocol for IPv6 (DHCPv6).
RFC, November, 2018

Tree-Permutation-Matrix Based LDPC Codes.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Glacier Change, Supraglacial Debris Expansion and Glacial Lake Evolution in the Gyirong River Basin, Central Himalayas, between 1988 and 2015.
Remote. Sens., 2018

An Approach to Evaluating the Number of Closed Paths in an All-One Base Matrix.
IEEE Access, 2018

Black box, a concept design: grief work and the digitized self.
Proceedings of the 10th Nordic Conference on Human-Computer Interaction, Oslo, 2018

A Turbo-Hadamard Encoder/Decoder System with Hundreds of Mbps Throughput.
Proceedings of the 10th IEEE International Symposium on Turbo Codes & Iterative Information Processing, 2018

VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Bandwidth Constrained Distributed Inter-domain Path Selection (DIPS).
Proceedings of the 14th International Conference on Network and Service Management, 2018

A Virtual Reality Based Simulator for Training Surgical Skills in Procedure of Catheter Ablation.
Proceedings of the 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality, 2018

Efficient vulnerability detection based on an optimized rule-checking static analysis technique.
Frontiers Inf. Technol. Electron. Eng., 2017

Autonomic Networking: Architecture Design and Standardization.
IEEE Internet Comput., 2017

Design and error performance of punctured hadamard codes.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

Dual-Stack Lite (DS-Lite) Management Information Base (MIB) for Address Family Transition Routers (AFTRs).
RFC, June, 2016

Privacy Considerations for DHCPv6.
RFC, May, 2016

Privacy Considerations for DHCP.
RFC, April, 2016

IPv4 Residual Deployment via IPv6 - A Stateless Solution (4rd).
RFC, July, 2015

General Gap Analysis for Autonomic Networking.
RFC, June, 2015

Autonomic Networking: Definitions and Design Goals.
RFC, June, 2015

Analysis of the 64-bit Boundary in IPv6 Addressing.
RFC, January, 2015

基于动态社会行为和用户背景的协同推荐方法 (Collaborative Filtering Recommendation Method Based on Dynamic Social Behavior and Users' Background Information).
计算机科学, 2015

Mining Class Temporal Specification Dynamically Based on Extended Markov Model.
Int. J. Softw. Eng. Knowl. Eng., 2015

Invariant foreground occupation ratio for scale adaptive mean shift tracking.
IET Comput. Vis., 2015

Cross-Modal Self-Taught Learning for Image Retrieval.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Multiclass Boosting Framework for Multimodal Data Analysis.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

A Software Assessment Method Based on Relevance Vulnerability.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Guidelines for Creating New DHCPv6 Options.
RFC, May, 2014

Significance of IPv6 Interface Identifiers.
RFC, February, 2014

Using the IPv6 Flow Label for Load Balancing in Server Farms.
RFC, January, 2014

Joint Design of Axis Alignment and Positioning for NLoS Indoor mmWave WLANs/WPANs.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Improving Static Analysis Performance Using Rule-Filtering Technique.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Transmission and Processing of IPv6 Extension Headers.
RFC, December, 2013

IPv6 Site Renumbering Gap Analysis.
RFC, September, 2013

RADIUS Attribute for IPv6 Rapid Deployment on IPv4 Infrastructures (6rd).
RFC, April, 2013

IPv6 Guidance for Internet Content Providers and Application Service Providers.
RFC, March, 2013

IPv6 Enterprise Network Renumbering Scenarios, Considerations, and Methods.
RFC, February, 2013

Problem Statement for Renumbering IPv6 Hosts with Static Addresses in Enterprise Networks.
RFC, February, 2013

Survey on Positioning System: Sampling methods.
CoRR, 2013

WiBEST: A hybrid personal indoor positioning system.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Native IPv6 behind IPv4-to-IPv4 NAT Customer Premises Equipment (6a44).
RFC, October, 2012

Rebind Capability in DHCPv6 Reconfigure Messages.
RFC, July, 2012

Moving A6 to Historic Status.
RFC, March, 2012

Background extraction algorithm base on Partition Weighed Histogram.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

IPv6 Flow Label Specification.
RFC, November, 2011

Rationale for Update to the IPv6 Flow Label Specification.
RFC, November, 2011

The Secure Neighbor Discovery (SEND) Hash Threat Analysis.
RFC, June, 2011

An Incremental Carrier-Grade NAT (CGN) for IPv6 Transition.
RFC, June, 2011

Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated Addresses.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Emerging Service Provider Scenarios for IPv6 Deployment.
RFC, October, 2010

Signature-driven multi-target tracking.
Proceedings of the 13th Conference on Information Fusion, 2010

Signature-Driven Multiple Visual Target Tracking.
Proceedings of the IEEE International Conference on Systems, 2009

Special Issue: The First Provenance Challenge.
Concurr. Comput. Pract. Exp., 2008

Extracting causal graphs from an open provenance data model.
Concurr. Comput. Pract. Exp., 2008

The provenance of electronic data.
Commun. ACM, 2008

Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

Security Issues in a SOA-Based Provenance System.
Proceedings of the Provenance and Annotation of Data, 2006

Make Grid systems IPv6-enabled and provide mobility support in Grid systems based on mobile IPv6.
PhD thesis, 2005

Web Intelligence Research Activities in the UK.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Moving Grid Systems into the IPv6 Era.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003