Xiaojuan Wang

Orcid: 0009-0008-3846-4587

According to our database1, Xiaojuan Wang authored at least 109 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification.
IEEE Trans. Netw. Serv. Manag., April, 2024

Joint UL/DL Dictionary Learning and Channel Estimation via Two-Timescale Optimization in Massive MIMO Systems.
IEEE Trans. Wirel. Commun., March, 2024

Spatial-Temporal Graph Model Based on Attention Mechanism for Anomalous IoT Intrusion Detection.
IEEE Trans. Ind. Informatics, March, 2024

Chatter Stability Prediction for Deep-Cavity Turning of a Bent-Blade Cutter.
Sensors, January, 2024

A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping.
IEEE Internet Things J., January, 2024

Supervised Representation Learning for Network Traffic With Cluster Compression.
IEEE Trans. Sustain. Comput., 2024

Rethinking the Person Localization for Single-Stage Multi-Person Pose Estimation.
IEEE Trans. Multim., 2024

Jump Cut Smoothing for Talking Heads.
CoRR, 2024

Incremental Recognition of Multi-Style Tibetan Character Based on Transfer Learning.
IEEE Access, 2024

2023
CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset.
Inf., February, 2023

Grouping by Center: Predicting Centripetal Offsets for the Bottom-up Human Pose Estimation.
IEEE Trans. Multim., 2023

A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model.
IEEE Trans. Inf. Forensics Secur., 2023

PPISB: A Novel Network-Based Algorithm of Predicting Protein-Protein Interactions With Mixed Membership Stochastic Blockmodel.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

Generative Powers of Ten.
CoRR, 2023

Homogeneity Test of Response Rate Functions in Bilateral Correlated Data under Dallal's Model.
Complex., 2023

Move Smart Contract Vulnerability Detection based on Resource-flow Analysis.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Research on the dynamic application of trademark similarity determination based on dynamic time regularization and XGBoost.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023

Research on Soft Sensor Modeling of Support Vector Machine for Wastewater Treatment.
Proceedings of the 8th International Conference on Automation, 2023

2022
A new approach for evaluating node importance in complex networks via deep learning methods.
Neurocomputing, 2022

AdaptivePose++: A Powerful Single-Stage Network for Multi-Person Pose Regression.
CoRR, 2022

Dual manipulator collaborative shaft slot assembly via MADDPG.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

Fine-Tuning Pre-Trained Model to Extract Undesired Behaviors from App Reviews.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

The Use of Pretrained Model for Matching App Reviews and Bug Reports.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Single-Stage is Enough: Multi-Person Absolute 3D Pose Estimation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

between flow and bytes.
Proceedings of the Eighth IEEE International Conference on Big Data Computing Service and Applications, 2022

Learning Quality-Aware Representation for Multi-Person Pose Regression.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

AdaptivePose: Human Parts as Adaptive Points.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
An Improved Image Segmentation Algorithm CT Superpixel Grid Using Active Contour.
Wirel. Commun. Mob. Comput., 2021

MT-ART: A Test Case Generation Method Based on Adaptive Random Testing and Metamorphic Relation.
IEEE Trans. Reliab., 2021

A Commodity Classification Framework Based on Machine Learning for Analysis of Trade Declaration.
Symmetry, 2021

HARNAS: Human Activity Recognition Based on Automatic Neural Architecture Search Using Evolutionary Algorithms.
Sensors, 2021

DRNet: A Depth-Based Regression Network for 6D Object Pose Estimation.
Sensors, 2021

Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.
Sensors, 2021

Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection.
Secur. Commun. Networks, 2021

An off-line approach for output feedback robust model predictive control.
J. Frankl. Inst., 2021

A node localization algorithm based on Voronoi diagram and support vector machine for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2021

Accurate Fine-grained Layout Analysis for the Historical Tibetan Document Based on the Instance Segmentation.
CoRR, 2021

The 2nd Anti-UAV Workshop & Challenge: Methods and Results.
CoRR, 2021

A survey on computational models for predicting protein-protein interactions.
Briefings Bioinform., 2021

Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification.
IEEE Access, 2021

Impact of datasets on machine learning based methods in Android malware detection: an empirical study.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Online Reconfigurable Deep Learning-Aided Multi-User Detection for IoT.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

An N-gram Based Deep Learning Method for Network Traffic Classification.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

An Empirical Study on Spectral Clustering-based Software Defect Detection.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
Risk-Based Uncertainty Set Optimization Method for Energy Management of Hybrid AC/DC Microgrids With Uncertain Renewable Generation.
IEEE Trans. Smart Grid, 2020

Research on intelligence analysis technology of financial industry data based on genetic algorithm.
J. Supercomput., 2020

Margin-Based Deep Learning Networks for Human Activity Recognition.
Sensors, 2020

Intelligent Medical Auxiliary Diagnosis Algorithm Based on Improved Decision Tree.
J. Electr. Comput. Eng., 2020

Asymptotic Behavior Analysis of a Fractional-Order Tumor-Immune Interaction Model with Immunotherapy.
Complex., 2020

A Hybrid Network Based on Dense Connection and Weighted Feature Aggregation for Human Activity Recognition.
IEEE Access, 2020

A Novel Stochastic Block Model for Network-Based Prediction of Protein-Protein Interactions.
Proceedings of the Intelligent Computing Theories and Application, 2020

Suppression of Relaxation Oscillations in DFB Lasers through Shaping Injection Current Waveforms.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Multi-Scale Adaptive Graph Convolutional Network for Skeleton-Based Action Recognition.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal Networks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

SPCNet: Spatial Preserve and Content-Aware Network for Human Pose Estimation.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Multi-label Image Classification Optimization Model Based on Deep Learning.
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020

2019
Response and Energy Absorption of Concrete Honeycombs Subjected to Dynamic In-Plane Compression: A Numerical Approach.
Symmetry, 2019

基于拓扑扩展的在线社交网络恶意信息源定位算法 (Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network).
计算机科学, 2019

3D Autonomous Navigation Line Extraction for Field Roads Based on Binocular Vision.
J. Sensors, 2019

Detection of power grid disturbances and cyber-attacks based on machine learning.
J. Inf. Secur. Appl., 2019

Anomaly detection in the web logs using user-behaviour networks.
Int. J. Web Eng. Technol., 2019

Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data.
IEEE Access, 2019

PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows.
IEEE Access, 2019

An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Learning 3D Semantic Reconstruction on Octrees.
Proceedings of the Pattern Recognition, 2019

2018
Malicious behaviour classification in web logs based on an improved Xgboost algorithm.
Int. J. Web Eng. Technol., 2018

A Recognition Method of the Similarity Character for Uchen Script Tibetan Historical Document Based on DNN.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Research on Text Line Segmentation of Historical Tibetan Documents Based on the Connected Component Analysis.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Research on the Method of Tibetan Recognition Based on Component Location Information.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Nucleotide-Based Significance of Somatic Synonymous Mutations for Pan-Cancer.
Proceedings of the Intelligent Computing Theories and Application, 2018

A Systematic Framework for Malicious Traffic Detection Based on Feature Repository.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Anomaly Detection in the Web Logs Using Unsupervised Algorithm.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

2017
Real-time EEG-based person authentication system using face rapid serial visual presentation.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

EEG-based target detection during a multi-rapid serial visual presentation.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

Investigating Alzheimer's Disease Candidate Genes Based on Combined Network Using Subnetwork Extraction Algorithms.
Proceedings of the Intelligent Computing Theories and Application, 2017

Analysis on Structural Vulnerability Under the Asymmetric Information.
Proceedings of the Human Centered Computing - Third International Conference, 2017

2016
Coverage and Capacity Optimization Analysis in Heterogeneous Cellular Networks Based on Truncated Function.
Wirel. Pers. Commun., 2016

Cross-Scenario Transfer Person Reidentification.
IEEE Trans. Circuits Syst. Video Technol., 2016

Topology Control based on Set Cover for Delay-Tolerant Networks.
J. Commun., 2016

A Topology Controlling Scheme Based on Guard Region in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2016

Green relay station assisted cell zooming scheme for cellular networks.
Proceedings of the 12th International Conference on Natural Computation, 2016

Online-offline consistency exploration based on the alternating direction method of multipliers.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Invulnerability Analysis for SDN Based on Complex Network Theory.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Virtual Mapping of Software Defined Wireless Network Based on Topological Perception.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Supervised Quantization for Similarity Search.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
Coupling of Zinc-Binding and Secondary Structure in Nonfibrillar Aβ40 Peptide Oligomerization.
J. Chem. Inf. Model., 2015

Multi-Scale Learning for Low-Resolution Person Re-Identification.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

An applicable testability framework for small satellite under the operational response space.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Synthesis of Bi<sup>3+</sup> and Gd<sup>3+</sup> doped ZnB<sub>2</sub>O<sub>4</sub> for evaluation as potential materials in luminescent display applications.
Displays, 2014

Joint optimization of coverage and capacity in heterogeneous cellular networks.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Asymmetric path-relinking based heuristics for large-scale job scheduling problem in TDRSS.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
Characterization of the polymorphic states of copper(II)-bound Aβ(1-16) peptides by computational simulations.
J. Comput. Chem., 2013

An improved multi-objective genetic algorithm for fuzzy flexible job-shop scheduling problem.
Int. J. Comput. Appl. Technol., 2013

Effect of alkali metal ions co-doping on the structure and luminescent properties of phosphor Zn<sub>3</sub>(BO<sub>3</sub>)<sub>2</sub>: Eu<sup>3+</sup>.
Displays, 2013

A joint sparse wavelet coefficient extraction and adaptive noise reduction method in recovery of weak bearing fault features from a multi-component signal mixture.
Appl. Soft Comput., 2013

Segmentation of Small Animal Computed Tomography Images Using Original CT Values and Converted Grayscale Values.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

2012
Task by stimulus interactions in brain responses during Chinese character processing.
NeuroImage, 2012

A multi-objective genetic algorithm for fuzzy flexible job-shop scheduling problem.
Int. J. Comput. Appl. Technol., 2012

2011
Left fusiform BOLD responses are inversely related to word-likeness in a one-back task.
NeuroImage, 2011

A new error estimation approach based on fuzzy logic system for H-R adaptive boundary element method.
Appl. Math. Comput., 2011

Multi-Objective Optimization for Dynamic Single-Machine Scheduling.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

On performance differences of EMD and WD in the nonlinear time series analysis.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Research on flexible job-shop scheduling problem under uncertainty based on genetic algorithm.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Formal Semantics of OWL-S with Rewrite Logic.
J. Softw. Eng. Appl., 2009

Mutation Test Based on OWL-S Requirement Model.
Proceedings of the IEEE International Conference on Web Services, 2009

Study on Automatic Detection of Airplane Object in Remote Sensing Images.
Proceedings of the Fuzzy Information and Engineering, 2009

2008
A Survey and Future Trend of Study on Multi-Objective Scheduling.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Electromagnetism-Like Mechanism Based Algorithm for Neural Network Training.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008


  Loading...