Calculated based on number of publications stored in Pure and citations from Scopus
20032024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model

    Xu, X., Cai, C. H., Yang, X., Xu, Z., Hu, J. & Sun, J., 24 Jul 2024, 15th Asia-Pacific Symposium on Internetware, Internetware 2024 - Proceedings. Association for Computing Machinery, p. 249-258 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cross-Modal Attentive Recalibration and Dynamic Fusion for Multispectral Pedestrian Detection

    Bao, W., Hu, J., Huang, M. & Xiang, X., 2024, Pattern Recognition and Computer Vision - 6th Chinese Conference, PRCV 2023, Proceedings. Liu, Q., Wang, H., Ji, R., Ma, Z., Zheng, W., Zha, H., Chen, X. & Wang, L. (eds.). Springer Science and Business Media Deutschland GmbH, p. 499-510 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14425 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Attention-Guided Multi-modal and Multi-scale Fusion for Multispectral Pedestrian Detection

    Bao, W., Huang, M., Hu, J. & Xiang, X., 2022, Pattern Recognition and Computer Vision - 5th Chinese Conference, PRCV 2022, Proceedings. Yu, S., Zhang, J., Zhang, Z., Tan, T., Yuen, P. C., Guo, Y., Han, J. & Lai, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 382-393 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13534 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2021

    Code Decoupling Execution Isolating Based on TF Card Firmware Extension

    Shi, Z., Chen, T., Xue, Y., Li, Y., Zhang, Q., Tan, Y. A. & Hu, J., 2021, Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021. Institute of Electrical and Electronics Engineers Inc., p. 403-408 6 p. (Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Domain adaptation based on ResADDA model for face anti-spoofing detection

    Jun, F., Zhiyi, D., Yichen, S. & Jingjing, H., Aug 2021, Proceedings - 2021 International Conference on Computer Engineering and Artificial Intelligence, ICCEAI 2021. Lin, P. & Yang, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 295-299 5 p. (Proceedings - 2021 International Conference on Computer Engineering and Artificial Intelligence, ICCEAI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Software Misconfiguration Troubleshooting Based on State Analysis

    Li, K., Xue, Y., Shao, Y., Su, B., Tan, Y. A. & Hu, J., 2021, Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021. Institute of Electrical and Electronics Engineers Inc., p. 361-366 6 p. (Proceedings - 2021 IEEE 6th International Conference on Data Science in Cyberspace, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2019

    An Improved Assessment Method for the Network Security Risk

    Hu, J., Guo, S., Meng, F., Hu, D. & Shi, Z., 2019, Smart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings. Qiu, M. (ed.). Springer, p. 42-52 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11910 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An Improved Prediction Model for the Network Security Situation

    Hu, J., Ma, D., Chen, L., Yan, H. & Hu, C., 2019, Smart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings. Qiu, M. (ed.). Springer, p. 22-33 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11910 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Blockchain-based asymmetric group key agreement protocol for mobile Ad Hoc network

    Zhang, Q., Li, Y., Li, J., Gan, Y., Zhang, Y. & Hu, J., 2019, Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Revised Selected Papers. Meng, W. & Furnell, S. (eds.). Springer, p. 47-56 10 p. (Communications in Computer and Information Science; vol. 1095 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
  • Evading PDF malware classifiers with generative adversarial network

    Wang, Y., Li, Y., Zhang, Q., Hu, J. & Kuang, X., 2019, Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings. Vaidya, J., Zhang, X. & Li, J. (eds.). Springer, p. 374-387 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2018

    Security extension and robust upgrade of smart-watch Wi-Fi controller firmware

    Han, W., Zhang, Q., Gao, C., Hu, J. & Yan, F., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 249-259 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Towards android application protection via kernel extension

    Wang, T., Liu, L., Gao, C., Hu, J. & Liu, J., 2018, Algorithms and Architectures for Parallel Processing - ICA3PP 2018 International Workshops, Proceedings. Hu, T., Li, H., Wang, Q. & Wang, F. (eds.). Springer Verlag, p. 131-137 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11338 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2014

    An analysis of network I/O workloads in virtualized cloud environment

    Xing, P., Miao, Y., Chao, D., Xingjun, L., Mengxiao, L. & Jingjing, H., 5 Nov 2014, Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Jiang, X., Li, S., Dai, Y. & Cheng, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 814-817 4 p. 6947780. (Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    An investigation of experimental teaching platform based on WEBQUEST - A case study in the network engineering

    Fangqin, X., Jingao, L., Lili, X. & Jingjing, H., 2012, Advances in Electric and Electronics. p. 141-148 8 p. (Lecture Notes in Electrical Engineering; vol. 155 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Behavioral compatibility analysis for context-independent service substitution

    Jin, J., Hu, J., Cao, Y. & Wang, J., 2012, Proceedings - 7th ChinaGrid Annual Conference, ChinaGrid 2012. p. 121-127 7 p. 6337286. (Proceedings - 7th ChinaGrid Annual Conference, ChinaGrid 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • 2011

    Quality constraint driven local optimization for efficient service composition

    Jin, J., Cao, Y., Zhang, C., Zhou, R. & Hu, J., 2011, 8th International Conference on Service Systems and Service Management - Proceedings of ICSSSM'11. 5959305. (8th International Conference on Service Systems and Service Management - Proceedings of ICSSSM'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2009

    A GPU based topology-preserving LOD model of trees

    Xing, Z. & Jingjing, H., 2009, Proceedings of the IADIS International Conference Computer Graphics, Visualization, Computer Vision and Image Processing 2009, CGVCVIP 2009. Part of the IADIS MCCSIS 2009. p. 255-260 6 p. (Proceedings of the IADIS International Conference Computer Graphics, Visualization, Computer Vision and Image Processing 2009, CGVCVIP 2009. Part of the IADIS MCCSIS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • GPU accelerated plant growth modeling and visualization

    Zhao, X., Hu, J. & Kang, M., 2009, Plant Growth Modeling, Simulation, Visualization and Applications, Proceedings - PMA09. IEEE Computer Society, p. 441-444 4 p. 5474655. (Plant Growth Modeling, Simulation, Visualization and Applications, Proceedings - PMA09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2008

    A context-aware computational trust model for multi-agent systems

    Wang, Y., Li, M., Dillon, E., Cui, L. G., Hu, J. J. & Liao, L. J., 2008, Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC. p. 1119-1124 6 p. 4525384. (Proceedings of 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • Service composition model with characteristic of transaction based on finite state machine

    Jingjing, H., Xing, Z., Yuanda, C. & Ruitao, Z., 2008, Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008. p. 450-454 5 p. 4741026. (Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • 2007

    A context-aware trust establishment and mapping framework for web applications

    Yong, W., Ming, L., Jingfeng, X., Jingjing, H., Longfei, Z. & Lejian, L., 2007, Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007. p. 892-896 5 p. 4415475. (Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2004

    A-prolog based service discovery in MAS

    Liu, L. Y., Cao, Y. D. & Hu, J. J., 2004, CSCWD 2004 - 8th International Conference on Computer Supported Cooperative Work in Design - Proceedings. Shen, W., Li, T., Lin, Z., Bartes, J.-P., Zeng, W., Li, S. & Yang, C. (eds.). p. 324-328 5 p. (CSCWD 2004 - 8th International Conference on Computer Supported Cooperative Work in Design - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review