default search action
Fan Jiang 0005
Person information
- affiliation: University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Fan Jiang — disambiguation page
- Fan Jiang 0001 — University of Manitoba, Department of Computer Science, Winnipeg, MB, Canada
- Fan Jiang 0002 — Xi'an University of Posts and Telecommunications, School of Communication and Information Engineering, China (and 2 more)
- Fan Jiang 0003 — Memorial University of Newfoundland, Department of Electrical and Computer Engineering, St. John's, NL, Canada
- Fan Jiang 0004 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- Fan Jiang 0006 — China University of Mining and Technology, School of Mechatronic Engineering, Xuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c26]Guangyu Zhang, Shaoyin Cheng, Xiang Song, Fan Jiang:
Detecting and Resolving Flow Entries Collisions in Software Defined Networks. CSAI 2019: 245-251 - [c25]Jinjing Huang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
Image steganography using texture features and GANs. IJCNN 2019: 1-8 - 2018
- [c24]Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
A Novel Android Malware Detection Approach Using Operand Sequences. SSIC 2018: 1-5 - 2017
- [c23]Fan Jiang, Cen Zhang, Shaoyin Cheng:
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability. ACISP (2) 2017: 61-79 - [c22]Xun Wei, Fan Jiang, Feng Wei, Jiekui Zhang, Weiwei Liao, Shaoyin Cheng:
An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset. Conf. Computing Frontiers 2017: 71-78 - 2016
- [c21]Feng Wei, Hao Guo, Shaoyin Cheng, Fan Jiang:
AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization. APWeb (2) 2016: 410-413 - [c20]Guoyou Sun, Shaoyin Cheng, Fan Jiang:
Strengthen Software-Defined Network in Cloud. HPCC/SmartCity/DSS 2016: 385-392 - 2015
- [c19]Xin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng:
An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets. CIT/IUCC/DASC/PICom 2015: 226-235 - [c18]Liang Cheng, Shaoyin Cheng, Fan Jiang:
ADKAM: A-Diversity K-Anonymity Model via Microaggregation. ISPEC 2015: 533-547 - [c17]Hao Guo, Feng Wei, Shaoyin Cheng, Fan Jiang:
Find Referral Social Networks. SocialSec 2015: 58-63 - 2013
- [c16]Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:
Novel user influence measurement based on user interaction in microblog. ASONAM 2013: 615-619 - [c15]Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang:
Static Detection of Dangerous Behaviors in Android Apps. CSS 2013: 363-376 - [c14]Hui Ye, Shaoyin Cheng, Lanbo Zhang, Fan Jiang:
DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag. MoMM 2013: 68 - [c13]Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:
Effective Method for Promoting Viral Marketing in Microblog. SocialCom 2013: 665-670 - 2012
- [c12]Guangyu Yin, Fan Jiang, Shaoyin Cheng, Xiang Li, Xing He:
AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks. CGC 2012: 360-367 - [c11]Wenlong Chen, Shaoyin Cheng, Xing He, Fan Jiang:
InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog. CGC 2012: 563-570 - 2011
- [c10]Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang:
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. TrustCom 2011: 150-159 - 2010
- [c9]Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang:
PDVDS: A Pattern-Driven Software Vulnerability Detection System. EUC 2010: 536-541
2000 – 2009
- 2008
- [c8]Zongyao Tang, Xuezhi Xing, Fan Jiang:
Providing Balanced and Enhanced Transmission for WLANs with Multi-beam Access Point. CNSR 2008: 242-248 - [c7]Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing:
DBTG: Demand-Driven Backtracking Test Generation. ICYCS 2008: 1944-1950 - 2006
- [c6]Kai Chen, Fan Jiang, Chuan-dong Huang, Zongyao Tang, Yang Qin:
Testing a Distributed System: Generating Test Sequences without Potential Controllability and Observability Problems. ICN/ICONS/MCL 2006: 170 - [c5]Kai Chen, Fan Jiang, Zongyao Tang:
A New Media Access Control Protocol for Ad-Hoc Wireless Sensor Networks. MSN 2006: 281-293 - [c4]Kai Chen, Fan Jiang, Chuan-dong Huang:
A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences. SAC 2006: 1791-1797 - [c3]Kai Chen, Yang Qin, Fan Jiang, Zongyao Tang:
A Probabilistic Energy-Efficient Routing (PEER) Scheme for Ad-hoc Sensor Networks. SECON 2006: 964-970 - [c2]Kai Chen, Fan Jiang, Zongyao Tang:
Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks. SSS 2006: 568-569 - 2005
- [c1]Chuan-dong Huang, Fan Jiang:
Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults. ICCNMC 2005: 1163-1170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint