default search action
Jigang Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Min Meng, Jiaxuan Sun, Jigang Liu, Jun Yu, Jigang Wu:
Semantic Disentanglement Adversarial Hashing for Cross-Modal Retrieval. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1914-1926 (2024) - 2023
- [j12]Mingkang Wang, Min Meng, Jigang Liu, Jigang Wu:
Adequate alignment and interaction for cross-modal retrieval. Virtual Real. Intell. Hardw. 5(6): 509-522 (2023) - [c54]Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
An Ontology-Based Framework for Medical IoT Forensic Evidence. QRS Companion 2023: 863-864 - 2022
- [j11]Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil, Jigang Liu:
Extending the UTAUT2 Model with a Privacy Calculus Model to Enhance the Adoption of a Health Information Application in Malaysia. Informatics 9(2): 31 (2022) - [j10]Jiaqi Guan, Min Meng, Tianyou Liang, Jigang Liu, Jigang Wu:
Dual-level contrastive learning network for generalized zero-shot learning. Vis. Comput. 38(9): 3087-3095 (2022) - [c53]Xiaofeng Qi, Chao Li, Zhongping Liang, Jigang Liu, Cheng Zhang, Yuanxin Wei, Lin Yuan, Guang Yang, Lanxiao Huang, Min Li:
MCS: An In-battle Commentary System for MOBA Games. COLING 2022: 2962-2967 - [c52]He Zhou, Jigang Liu:
An Enhanced RSSI-based Framework for Localization of Bluetooth Devices. EIT 2022: 296-304 - [c51]Zhuanghui Wu, Tianyou Liang, Min Meng, Jigang Liu, Jun Yu, Jigang Wu:
Triple Disentangling Network for Unsupervised Domain Adaptation. ICME 2022: 1-6 - 2020
- [c50]Yan-Chao Wang, Jigang Liu, Feng Lin, Seah Hock Soon:
Generating Orthogonal Voronoi Treemap for Visualization of Hierarchical Data. CGI 2020: 394-402 - [c49]Ismail Bile Hassan, Jigang Liu:
A Comparative Study of the Academic Programs between Informatics/BioInformatics and Data Science in the U.S. COMPSAC 2020: 165-171 - [c48]Francis Avorgbedor, Jigang Liu:
Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook. EIT 2020: 155-161 - [c47]Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
Towards a Holistic Approach to Medical IoT Forensics. QRS Companion 2020: 686-687
2010 – 2019
- 2019
- [j9]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c46]Ismail Bile Hassan, Jigang Liu:
Embedding Data Science into Computer Science Education. EIT 2019: 367-372 - [c45]Jigang Liu, Francis Bu-Sung Lee, Deepu Rajan:
Free-Head Appearance-Based Eye Gaze Estimation on Mobile Devices. ICAIIC 2019: 232-237 - [c44]En Teng Wong, Seanglidet Yean, Qingyao Hu, Bu-Sung Lee, Jigang Liu, Deepu Rajan:
Gaze Estimation Using Residual Neural Network. PerCom Workshops 2019: 411-414 - 2018
- [c43]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2018 Workshop Organizers. COMPSAC (2) 2018: 352 - 2017
- [j8]Yanjun Zuo, Jigang Liu:
A reputation-based model for mobile agent migration for information search and retrieval. Int. J. Inf. Manag. 37(5): 357-366 (2017) - [c42]Milton H. Luoma, Jigang Liu, Kai Qian:
Designing an Undergraduate Minor Program in E-Discovery. ITiCSE 2017: 361 - [c41]Jigang Liu, Rashmi Kammar, Ryôichi Sasaki, Tetsutaro Uehara:
Malware Behavior Ontology for Digital Evidence. QRS Companion 2017: 585-586 - 2016
- [c40]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE Workshop Organizers. COMPSAC Workshops 2016: 355 - [c39]Boyu Hou, Kai Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu:
MongoDB NoSQL Injection Analysis and Detection. CSCloud 2016: 75-78 - [c38]Jigang Liu:
Baccalaureate programs in computer forensics. EIT 2016: 615-620 - [c37]Jigang Liu:
Ten-Year Synthesis Review: A Baccalaureate Program in Computer Forensics. SIGITE 2016: 121-126 - 2015
- [b1]Jigang Liu:
Conditional bayesian filtering for robot navigation and human tracking. Nanyang Technological University, Singapore, 2015 - [j7]Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. Inf. Sci. 321: 147-149 (2015) - [j6]Jigang Liu, Dongquan Liu, Justin Dauwels, Hock Soon Seah:
3D Human motion tracking by exemplar-based conditional particle filter. Signal Process. 110: 164-177 (2015) - [c36]Gayathri Natesan, Jigang Liu:
An Adaptive Learning Model for k-Anonymity Location Privacy Protection. COMPSAC Workshops 2015: 10-16 - [c35]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2015 Workshop Organizers. COMPSAC Workshops 2015: 17 - [c34]Yanjun Zuo, Jigang Liu:
Mobile Agent-Based Service Migration. ITNG 2015: 8-13 - 2014
- [j5]Jigang Liu, Dongquan Liu, Jun Cheng, Yuanyan Tang:
Conditional simultaneous localization and mapping: A robust visual SLAM system. Neurocomputing 145: 269-284 (2014) - [c33]Anyi Liu, Jigang Liu, Tetsutaro Uehara:
Secure streaming forensic data transmission for trusted cloud. SFCS@ASIACCS 2014: 3-10 - [c32]David Larson, Jigang Liu, Yanjun Zuo:
Performance analysis of javascript injection detection techniques. EIT 2014: 140-148 - [c31]Ryan Q. Hankins, Jigang Liu:
A novel approach to evaluating similarity in computer forensic investigations. EIT 2014: 567-572 - [c30]Dave Larson, Jigang Liu, Yanjun Zuo:
Analyzing the Vulnerabilities in GWT Code and Applications. CANDAR 2014: 525-530 - 2013
- [c29]Dave Larson, Jigang Liu:
A New Security Metric for SOA Implementations. SERE (Companion) 2013: 102-108 - 2011
- [j4]Jigang Liu, Tetsutaro Uehara, Ryôichi Sasaki:
Development of digital forensics practice and research in Japan. Wirel. Commun. Mob. Comput. 11(2): 240-253 (2011) - 2010
- [j3]Daming Shi, Liying Zheng, Jigang Liu:
Advanced Hough Transform Using A Multilayer Fractional Fourier Method. IEEE Trans. Image Process. 19(6): 1558-1566 (2010) - [c28]Kai Qian, Chia-Tien Dan Lo, Li Yang, Jigang Liu:
Inquiry-based active learning in introductory programming courses. ITiCSE 2010: 312 - [c27]Jigang Liu, Maylor Karhang Leung, Daming Shi:
Conditional Localization and Mapping Using Stereo Camera. PRICAI 2010: 146-156
2000 – 2009
- 2009
- [c26]Jigang Liu, Tetsutaro Uehara:
Computer Forensics in Japan: A Preliminary Study. ARES 2009: 1006-1011 - [c25]Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, Jigang Liu:
Resource Allocation Optimization for GSD Projects. ICCSA (2) 2009: 13-28 - [c24]Kai Qian, Jigang Liu, Lixin Tao:
Teach real-time embedded system online with real hands-on labs. ITiCSE 2009: 367 - [c23]Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu:
A Comparative Study of Forensic Science and Computer Forensics. SSIRI 2009: 230-239 - [c22]Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu:
A Turing Machine-Based Model for Computer Forensic Reconstruction. SSIRI 2009: 289-290 - 2008
- [c21]Navya Sidharth, Jigang Liu:
Intrusion Resistant SOAP Messaging with IAPF. APSCC 2008: 856-862 - [c20]Ryan Q. Hankins, Jigang Liu:
Towards a forensic-aware file system. EIT 2008: 84-89 - [c19]Yectli Adolfo Huerta, Jigang Liu:
Enhancing malware detection in an IM environment. EIT 2008: 231-236 - [c18]Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, Jigang Liu:
APOGEE: automated project grading and instant feedback system for web based computing. SIGCSE 2008: 77-81 - [c17]Daming Shi, Ming Hei Tsui, Jigang Liu:
Web document categorization by Support Vector Clustering. SMC 2008: 1483-1488 - 2007
- [j2]Jigang Liu:
Book Review: Computer Forensics: Principles and Practices. J. Digit. Forensics Secur. Law 2(3): 57-60 (2007) - [c16]Kai Qian, Jigang Liu, Shangrong Deng:
Recursion detection testing on software components. ACM Southeast Regional Conference 2007: 523-524 - [c15]Navya Sidharth, Jigang Liu:
A Framework for Enhancing Web Services Security. COMPSAC (1) 2007: 23-30 - [c14]Habtamu Bogale, Jigang Liu:
Secure Web Applications: A Systematic Approach. Security and Management 2007: 217-222 - 2006
- [c13]Kai Qian, Jigang Liu, Frank Tsui:
Decoupling Metrics for Services Composition. ACIS-ICIS 2006: 44-47 - [c12]Kai Qian, Jigang Liu:
An Incremental, Spiral, Topic-Driven Approach -- Designing labs and projects for a Web technology course. FECS 2006: 67-74 - [c11]Kai Qian, Jigang Liu:
Recursion Detection Testing on Software Components. IMECS 2006: 828-832 - [c10]Kai Qian, Jigang Liu, Lixin Tao:
Asynchronous Callback in Web Services. SNPD 2006: 375-380 - 2005
- [c9]Jigang Liu:
Know What to Learn and Learn How to Learn. FECS 2005: 120-126 - [c8]Larry Gottschalk, Jigang Liu, Brahma Dathan, Sue Fitzgerald, Michael Stein:
Computer forensics programs in higher education: a preliminary study. SIGCSE 2005: 147-151 - 2004
- [c7]Jigang Liu:
A New Framework for Teaching Web Technology. International Conference on Internet Computing 2004: 982-987 - [c6]Kai Qian, Orlando Karam, Jorge Diaz, Jigang Liu:
Design Patterns for Web Services. SNPD 2004: 342-348 - 2003
- [c5]Jigang Liu, Ronghui Wu, Qingxin Su:
A direct up-conversion transmitter architecture for TD-SCDMA handset. PIMRC 2003: 2900-2904 - 2002
- [c4]Jigang Liu, Fenglien Lee, Kai Qian:
A Parallel Prefix Convex Hill Algorithm Using MasPar. PDPTA 2002: 1089-1095
1990 – 1999
- 1999
- [c3]Jigang Liu, Doris L. Carver:
Performance Evaluation of Parallel Computational Geometry Algorithms on Maspar. PDPTA 1999: 1377-1383 - 1996
- [j1]Doris L. Carver, Jigang Liu, S. Q. Zheng:
Planar Convex Hull Algorithms on Linear Arrays. Parallel Algorithms Appl. 10(1-2): 59-70 (1996) - 1995
- [c2]Jigang Liu, Doris L. Carver, Si-Qing Zheng:
A Generalized Approach for Computing Convex Hulls Using Linear Arrays. Parallel and Distributed Computing and Systems 1995: 269-272 - 1992
- [c1]Jigang Liu, Si-Qing Zheng:
A simplified optimal algorithm for constructing the convex hull of a simple polygon. ACM Southeast Regional Conference 1992: 453-456
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint