default search action
Jia Wang 0008
Person information
- affiliation: Shenzhen University, College of Computer Science and Software Engineering, China
Other persons with the same name
- Jia Wang — disambiguation page
- Jia Wang 0001 — AT&T Labs-Research, Florham Park, NJ, USA (and 1 more)
- Jia Wang 0002 — State University of New York at Buffalo, Department of Electrical and Computer Engineering, NY, USA
- Jia Wang 0003 — Illinois Institute of Technology, Department of Electrical and Computer Engineering, Chicago, IL, USA (and 1 more)
- Jia Wang 0004 — Shanghai Jiao Tong University, Department of Electronic Engineering, Institute of Image Communication and Network Engineering, China
- Jia Wang 0005 — Worcester Polytechnic Institute, HIVE Lab, MA, USA
- Jia Wang 0006 — University of Greenwich, Old Royal Naval College, London, UK (and 1 more)
- Jia Wang 0007 — City University of Hong Kong, Department of Electric Engineering, Hong Kong
- Jia Wang 0009 — Xi'an Jiaotong-Liverpool University, Suzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Yanjie Dong, Luya Wang, Jia Wang, Xiping Hu, Haijun Zhang, Fei Richard Yu, Victor C. M. Leung:
Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principal Component Analysis. IEEE Trans. Wirel. Commun. 23(6): 5938-5952 (2024) - [c13]Jia Wang, Wuqiang Su, Zushu Huang, Jie Chen, Chengwen Luo, Jianqiang Li:
Practical Privacy-Preserving MLaaS: When Compressive Sensing Meets Generative Networks. AAAI 2024: 15502-15510 - [c12]Sijjad Ali, Jia Wang, Victor Chung Ming Leung, Asad Ali:
Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing Schemes. IoTBDS 2024: 294-301 - 2023
- [j16]Sijjad Ali, Jia Wang, Victor Chung Ming Leung:
Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101784 (2023) - [c11]Jia Wang, Gui-Qing Pan, Jian-Qiang Li, Xue-Qun Shang, Zhu-Hong You, Yu-An Huang:
Deep-USIpred: identifying substrates of ubiquitin protein ligases E3 and deubiquitinases with pretrained protein embedding and bayesian neural network. BIBM 2023: 2277-2280 - [c10]Jia Wang, Shiqing He, Qiuzhen Lin:
RRML: Privacy Preserving Machine Learning Based on Random Response Technology. NSS 2023: 217-234 - [c9]Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu:
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. USENIX Security Symposium 2023: 3511-3528 - [i3]Yanjie Dong, Luya Wang, Yuanfang Chi, Jia Wang, Haijun Zhang, Fei Richard Yu, Victor C. M. Leung, Xiping Hu:
Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principle Component Analysis. CoRR abs/2303.17885 (2023) - 2022
- [j15]Jia Wang, Chengyu Wang, Qiuzhen Lin, Chengwen Luo, Chao Wu, Jianqiang Li:
Adversarial attacks and defenses in deep learning for image recognition: A survey. Neurocomputing 514: 162-181 (2022) - [j14]Jie Chen, Yingru Chen, Jianqiang Li, Jia Wang, Zijie Lin, Asoke K. Nandi:
Stroke Risk Prediction With Hybrid Deep Transfer Learning Framework. IEEE J. Biomed. Health Informatics 26(1): 411-422 (2022) - [j13]Jia Wang, Wuqiang Su, Chengwen Luo, Jie Chen, Houbing Song, Jianqiang Li:
CSG: Classifier-Aware Defense Strategy Based on Compressive Sensing and Generative Networks for Visual Recognition in Autonomous Vehicle Systems. IEEE Trans. Intell. Transp. Syst. 23(7): 9543-9553 (2022) - [c8]Jie Chen, Ting-Bo Chen, Chen-Qiu Zhang, Ling-Yan Gu, Jia Wang, Yao-Xing Wu, Jian-Qiang Li:
Capsulated Graph Neural Network for Ubiquitylation Sites Prediction. BIBM 2022: 3797-3799 - [c7]Jia Wang, Yazheng Li, Ronghang Ye, Jianqiang Li:
High Precision Method of Federated Learning Based on Cosine Similarity and Differential Privacy. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 533-540 - [c6]Jia Wang, Tianhao Lan, Jie Chen, Chengwen Luo, Chao Wu, Jianqiang Li:
Phoneme-Aware Adaptation with Discrepancy Minimization and Dynamically-Classified Vector for Text-independent Speaker Verification. ACM Multimedia 2022: 6737-6745 - 2021
- [c5]Chengyu Wang, Jia Wang, Qiuzhen Lin:
Adversarial Attacks and Defenses in Deep Learning: A Survey. ICIC (1) 2021: 450-461 - [c4]Weitao Xu, Zhenjiang Li, Wanli Xue, Xiaotong Yu, Bo Wei, Jia Wang, Chengwen Luo, Wei Li, Albert Y. Zomaya:
InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices. IPSN 2021: 106-118 - [i2]Weitao Xu, Zhenjiang Li, Wanli Xue, Xiaotong Yu, Bo Wei, Jia Wang, Chengwen Luo, Wei Li, Albert Y. Zomaya:
InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices. CoRR abs/2102.10908 (2021) - 2020
- [j12]Jia Wang, Yuchao Su, Qiuzhen Lin, Lijia Ma, Dunwei Gong, Jianqiang Li, Zhong Ming:
A survey of decomposition approaches in multiobjective evolutionary algorithms. Neurocomputing 408: 308-330 (2020) - [j11]Jinjiang Lai, Chengwen Luo, Jiawei Wu, Jianqiang Li, Jia Wang, Jie Chen, Gang Feng, Houbing Song:
TagSort: Accurate Relative Localization Exploring RFID Phase Spectrum Matching for Internet of Things. IEEE Internet Things J. 7(1): 389-399 (2020) - [j10]Jian-qiang Li, Yi-Fan Zhang, Zhuangzhuang Chen, Jia Wang, Min Fang, Cheng-wen Luo, Huihui Wang:
A novel edge-enabled SLAM solution using projected depth image information. Neural Comput. Appl. 32(19): 15369-15381 (2020) - [j9]Chengwen Luo, Jiawei Wu, Jianqiang Li, Jia Wang, Weitao Xu, Zhong Ming, Bo Wei, Wei Li, Albert Y. Zomaya:
Gait Recognition as a Service for Unobtrusive User Identification in Smart Spaces. ACM Trans. Internet Things 1(1): 5:1-5:21 (2020) - [c3]Weitao Xu, Zhenjiang Li, Wanli Xue, Xiaotong Yu, Jia Wang, Chengwen Luo, Wei Li, Albert Y. Zomaya:
Inaudible acoustic signal based key agreement system for IoT devices: poster abstract. SenSys 2020: 689-690
2010 – 2019
- 2019
- [j8]Weitao Xu, Xingyu Feng, Jia Wang, Chengwen Luo, Jianqiang Li, Zhong Ming:
Energy Harvesting-Based Smart Transportation Mode Detection System via Attention-Based LSTM. IEEE Access 7: 66423-66434 (2019) - [j7]Yuchao Su, Jia Wang, Lijia Ma, Xiaozhou Wang, Qiuzhen Lin, Carlos A. Coello Coello, Jianyong Chen:
A hybridized angle-encouragement-based decomposition approach for many-objective optimization problems. Appl. Soft Comput. 78: 355-372 (2019) - [j6]Yuchao Su, Qiuzhen Lin, Jia Wang, Jianqiang Li, Jianyong Chen, Zhong Ming:
A Constrained Solution Update Strategy for Multiobjective Evolutionary Algorithm Based on Decomposition. Complex. 2019: 3251349:1-3251349:11 (2019) - [j5]Haiyan Wang, Qiuzhen Lin, Jianyong Chen, Jianqiang Li, Jianghua Zhong, Dongdai Lin, Jia Wang, Lijia Ma:
On Stability of Multi-Valued Nonlinear Feedback Shift Registers. Complex. 2019: 8765970:1-8765970:11 (2019) - [j4]Jia Wang, Houbing Song, Jianqiang Li, Qiuzhen Lin, Lee-Ming Cheng:
Modular exponential multivariate sequence and its application to lightweight security design. Future Gener. Comput. Syst. 98: 435-443 (2019) - [j3]Jia Wang, Jianqiang Li, Huihui Wang, Leo Yu Zhang, Lee-Ming Cheng, Qiuzhen Lin:
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security. IEEE Internet Things J. 6(4): 5892-5901 (2019) - [j2]Jia Wang, Leo Yu Zhang, Junxin Chen, Guang Hua, Yushu Zhang, Yong Xiang:
Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans. Ind. Informatics 15(12): 6560-6571 (2019) - [c2]Lingjie Li, Qiuzhen Lin, Jia Wang, Jianyong Chen, Zhong Ming:
A Novel Multiobjective Particle Swarm Optimization Algorithm with Dynamic Resource Allocation. CEC 2019: 904-911 - 2018
- [j1]Jia Wang, Shuai Liu, Houbing Song:
Fractal Research on the Edge Blur Threshold Recognition in Big Data Classification. Mob. Networks Appl. 23(2): 251-260 (2018) - [c1]Yuchao Su, Jia Wang, Lijia Ma, Xiaozhou Wang, Qiuzhen Lin, Jianyong Chen:
A Novel Many-Objective Optimization Algorithm Based on the Hybrid Angle-Encouragement Decomposition. ICIC (3) 2018: 47-53 - 2015
- [i1]Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-Wo Wong:
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure. CoRR abs/1503.06638 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint