default search action
Jingjing Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Gangqiang Zhang, Jingjing Hu, Jing Yang, Pengfei Zhang:
Interactive streaming feature selection based on neighborhood rough sets. Eng. Appl. Artif. Intell. 139: 109479 (2025) - 2024
- [j31]Yongming Luo, Jingjing Hu, Gangqiang Zhang, Pengfei Zhang, Ying Xie, Zhaomin Kuang, Xingji Zeng, Shushi Li:
A dissolved oxygen levels prediction method based on single-hidden layer feedforward neural network using neighborhood information metric. Appl. Soft Comput. 167: 112328 (2024) - [j30]Gangqiang Zhang, Jingjing Hu, Pengfei Zhang:
Leveraging Local Density Decision Labeling and Fuzzy Dependency for Semi-supervised Feature Selection. Int. J. Fuzzy Syst. 26(8): 2805-2820 (2024) - [j29]Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren:
The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing. J. Electr. Comput. Eng. 2024: 7486890:1-7486890:6 (2024) - [j28]Zhenyu Guo, Xin Li, Jiamou Liu, Zijian Zhang, Meng Li, Jingjing Hu, Liehuang Zhu:
Graph-Based Covert Transaction Detection and Protection in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2244-2257 (2024) - [j27]Jingjing Hu, Yu Li, Zhaozhao Li, Qinrang Liu, Jiangxing Wu:
Unveiling the Strategic Defense Mechanisms in Dynamic Heterogeneous Redundancy Architecture. IEEE Trans. Netw. Serv. Manag. 21(4): 4912-4926 (2024) - [c36]Xiuqi Yang, Xiaojun Xu, Zhuofan Xu, Jing Chu, Jingjing Hu:
DiffGCL: Diffusion model-based Graph Contrastive Learning for Service Recommendation. ICWS 2024: 310-319 - [c35]Xiaojun Xu, Chenghao Cai, Xiuqi Yang, Zhuofan Xu, Jingjing Hu, Jing Sun:
A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model. Internetware 2024 - [c34]Jingjing Hu, Dan Guo, Kun Li, Zhan Si, Xun Yang, Meng Wang:
Maskable Retentive Network for Video Moment Retrieval. ACM Multimedia 2024: 1476-1485 - [c33]Dan Guo, Xiaobai Li, Kun Li, Haoyu Chen, Jingjing Hu, Guoying Zhao, Yi Yang, Meng Wang:
MAC 2024: Micro-Action Analysis Grand Challenge. ACM Multimedia 2024: 11304-11305 - [i2]Jingjing Hu, Dan Guo, Kun Li, Zhan Si, Xun Yang, Xiaojun Chang, Meng Wang:
Unified Static and Dynamic Network: Efficient Temporal Filtering for Video Grounding. CoRR abs/2403.14174 (2024) - [i1]Ning An, Lei Hei, Yong Jiang, Weiping Meng, Jingjing Hu, Boran Huang, Feiliang Ren:
RTF: Region-based Table Filling Method for Relational Triple Extraction. CoRR abs/2404.19154 (2024) - 2023
- [j26]Ke Men, Yihao Li, Xia Wang, Guangwei Zhang, Jingjing Hu, Yanyan Gao, Ashley Han, Wenbin Liu, Henry Han:
Estimate the incubation period of coronavirus 2019 (COVID-19). Comput. Biol. Medicine 158: 106794 (2023) - [j25]Jingjing Hu, Xiaojun Xu, Jin Hao, Xiuqi Yang, Kefan Qiu, Yuanzhang Li:
Microservice combination optimisation based on improved gray wolf algorithm. Connect. Sci. 35(1) (2023) - [j24]Xiaojin Fan, Ruitao Hou, Lei Chen, Liehuang Zhu, Jingjing Hu:
Transfer subspace learning via label release and contribution degree distinction. Inf. Sci. 642: 118724 (2023) - [j23]Jingjing Hu, Jie Wu, George P. Petropoulos, Yansong Bao, Jian Liu, Qifeng Lu, Fu Wang, Heng Zhang, Hui Liu:
Temperature and Relative Humidity Profile Retrieval from Fengyun-3D/VASS in the Arctic Region Using Neural Networks. Remote. Sens. 15(6): 1648 (2023) - [c32]Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren:
MergeTree: a Tree Model with Merged Nodes for Threat Induction. CACML 2023: 49-53 - [c31]Wei Bao, Jingjing Hu, Meiyu Huang, Xueshuang Xiang:
Cross-Modal Attentive Recalibration and Dynamic Fusion for Multispectral Pedestrian Detection. PRCV (1) 2023: 499-510 - 2022
- [j22]Chen Liang, Kefan Qiu, Zheng Zhang, Jie Yang, Yuanzhang Li, Jingjing Hu:
Towards robust and stealthy communication for wireless intelligent terminals. Int. J. Intell. Syst. 37(12): 11791-11814 (2022) - [j21]Jingjing Hu, Yi-Fen Ke, Changfeng Ma:
Generalized conjugate direction algorithm for solving generalized coupled Sylvester transpose matrix equations over reflexive or anti-reflexive matrices. J. Frankl. Inst. 359(13): 6958-6985 (2022) - [j20]Wei Bao, Jingjing Hu, Meiyu Huang, Yao Xu, Nan Ji, Xueshuang Xiang:
Detecting Fine-Grained Airplanes in SAR Images With Sparse Attention-Guided Pyramid and Class-Balanced Data Augmentation. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 8586-8599 (2022) - [c30]Shumao Pan, Jingjing Hu, Gangqiang Zhang:
A feature selection method combining neighborhood rough set and butterfly optimization algorithm. CCIS 2022: 684-690 - [c29]Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:
timeTree: How to Represent Time Sequence in a Threat Tree. HPCC/DSS/SmartCity/DependSys 2022: 2373-2378 - [c28]Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:
Vision Detection System Based on Mixed Recognition of Gesture and Speech. ICACT 2022: 348-353 - [c27]Wei Bao, Meiyu Huang, Jingjing Hu, Xueshuang Xiang:
Attention-Guided Multi-modal and Multi-scale Fusion for Multispectral Pedestrian Detection. PRCV (1) 2022: 382-393 - [c26]Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:
tTree+: A Threat Tree Model for Representing Complex Semantics. TrustCom 2022: 339-344 - 2021
- [j19]Jingjing Hu, You-Fang Huang, Zhi-Hua Hu:
Multi-depot vehicle routing problem with cooperative transportation in terminal distribution. Int. J. Appl. Decis. Sci. 14(5): 588-614 (2021) - [j18]Jingjing Hu:
Teaching Evaluation System by use of Machine Learning and Artificial Intelligence Methods. Int. J. Emerg. Technol. Learn. 16(5) (2021) - [j17]Qikun Zhang, Yongjiao Li, Ruifang Wang, Lu Liu, Yu-an Tan, Jingjing Hu:
Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Int. J. Intell. Syst. 36(1): 94-111 (2021) - [j16]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j15]Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu:
An Efficient Bounded Model Checking Approach for Web Service Composition. Mob. Networks Appl. 26(4): 1503-1513 (2021) - [j14]Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. Mob. Networks Appl. 26(4): 1616-1629 (2021) - [j13]Jingjing Hu, Yansong Bao, Jian Liu, Hui Liu, George P. Petropoulos, Petros Katsafados, Liuhua Zhu, Xi Cai:
Temperature and Relative Humidity Profile Retrieval from Fengyun-3D/HIRAS in the Arctic Region. Remote. Sens. 13(10): 1884 (2021) - [c25]Ke Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan, Jingjing Hu:
Software Misconfiguration Troubleshooting Based on State Analysis. DSC 2021: 361-366 - [c24]Zhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan, Jingjing Hu:
Code Decoupling Execution Isolating Based on TF Card Firmware Extension. DSC 2021: 403-408 - [c23]Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:
Vision Detection System Based on Mixed Recognition of Gesture and Speech. ICACT 2021: 348-353 - [c22]Jiazheng Chen, Jingjing Hu, Gangqiang Zhang:
Feature Selection Based on Gain Ratio in Hybrid Incomplete Information Systems. ISKE 2021: 728-735 - 2020
- [j12]Jingjing Hu, Shuangshuang Guo, Xiaohui Kuang, Fankun Meng, Dongsheng Hu, Zhiyu Shi:
I-HMM-Based Multidimensional Network Security Risk Assessment. IEEE Access 8: 1431-1442 (2020) - [j11]Quanxin Zhang, Yuhang Zhao, Yajie Wang, Thar Baker, Jian Zhang, Jingjing Hu:
Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Networks 180: 107388 (2020) - [j10]Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. Future Gener. Comput. Syst. 102: 472-480 (2020) - [j9]Wei Ren, Jingjing Hu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
A flexible method to defend against computationally resourceful miners in blockchain proof of work. Inf. Sci. 507: 161-171 (2020) - [c21]Ziquan Wang, Wei Huang, Lidong Tong, Jingjing Hu, Jiajia Xu, Yingjie Lin:
Design of Timing Charging and Discharging System for Pneumatic or Hydraulic Pressure Device Based on STM32. EITCE 2020: 1108-1112 - [c20]Qi Zhan, Jingjing Hu, Zitong Yu, Xiaobai Li, Wenjin Wang:
Revisiting motion-based respiration measurement from videos. EMBC 2020: 5909-5912
2010 – 2019
- 2019
- [j8]Jialing He, Zijian Zhang, Meng Li, Liehuang Zhu, Jingjing Hu:
Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things. IEEE Access 7: 6226-6239 (2019) - [j7]Jingjing Hu, Dongyan Ma, Chen Liu, Zhiyu Shi, Huaizhi Yan, Changzhen Hu:
Network Security Situation Prediction Based on MR-SVM. IEEE Access 7: 130937-130945 (2019) - [j6]Quanxin Zhang, Kunqing Wang, Wenjiao Zhang, Jingjing Hu:
Attacking Black-Box Image Classifiers With Particle Swarm Optimization. IEEE Access 7: 158051-158063 (2019) - [j5]Zhitao Guan, Yue Zhang, Longfei Wu, Jun Wu, Jing Li, Yinglong Ma, Jingjing Hu:
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J. Netw. Comput. Appl. 125: 82-92 (2019) - [c19]Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. CSS (1) 2019: 374-387 - [c18]Jingjing Hu, Yunze He, Jie Liu, Min He, Wenjin Wang:
Illumination Robust Heart-rate Extraction from Single-wavelength Infrared Camera Using Spatial-channel Expansion. EMBC 2019: 3896-3899 - [c17]Jingjing Hu, Dongyan Ma, Chen Liu, Huaizhi Yan, Changzhen Hu:
An Improved Prediction Model for the Network Security Situation. SmartCom 2019: 22-33 - [c16]Jingjing Hu, Shuangshuang Guo, Fankun Meng, Dongsheng Hu, Zhiyu Shi:
An Improved Assessment Method for the Network Security Risk. SmartCom 2019: 42-52 - [c15]Qikun Zhang, Yongjiao Li, Jianyong Li, Yong Gan, Yanhua Zhang, Jingjing Hu:
Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network. SocialSec 2019: 47-56 - 2018
- [j4]Yuanzhang Li, Jingjing Hu, Zhuozhuo Wu, Chen Liu, Feifei Peng, Yu Zhang:
Research on QoS service composition based on coevolutionary genetic algorithm. Soft Comput. 22(23): 7865-7874 (2018) - [c14]Tuo Wang, Lu Liu, Chongzhi Gao, Jingjing Hu, Jingyu Liu:
Towards Android Application Protection via Kernel Extension. ICA3PP (Workshops) 2018: 131-137 - [c13]Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. ICA3PP (4) 2018: 249-259 - 2017
- [c12]Jingjing Hu, Yancheng Ji, Junma Li, Danfeng Dong:
Research on Power Allocation of Network Coding in Vehicle Networking. NaNA 2017: 347-352 - 2016
- [j3]Jingjing Hu, Xiaolei Chen, Changyou Zhang:
Proactive service selection based on acquaintance model and LS-SVM. Neurocomputing 211: 60-65 (2016) - [j2]Jingjing Hu, Xing Zhao, Huitao Zhang:
A GPU-based multi-resolution approach to iterative reconstruction algorithms in x-ray 3D dual spectral computed tomography. Neurocomputing 215: 71-81 (2016) - [c11]Shifu Chen, Yue Han, Lanting Guo, Jingjing Hu, Jia Gu:
SeqMaker: A next generation sequencing simulator with variations, sequencing errors and amplification bias integrated. BIBM 2016: 835-840 - [c10]Jingjing Hu, Jiayun Xu, Can Zhang, Haifeng Bi, Yiqian Yang:
Research on equivalent simplified model of multi-level vertical isolated structure under heavy-haul train vibration. ICITE 2016: 207-211 - [c9]Jingjing Hu, Johannes A. Hegt, Arthur H. M. van Roermund, Sotir F. Ouzounov:
Higher-order DWA in bandpass delta-sigma modulators and its implementation. ISCAS 2016: 73-76 - 2015
- [c8]Jingjing Hu, Hans Hegt, Arthur H. M. van Roermund, Sotir Ouzounov:
Bitstream switching rate based calibration of delta-sigma modulators. ISCAS 2015: 2293-2296 - [c7]Jingjing Hu, Johannes A. Hegt, Arthur H. M. van Roermund, Sotir F. Ouzounov:
Automatic filter calibration for bandpass delta-sigma modulators. MWSCAS 2015: 1-4 - 2012
- [c6]Jun Jin, Jingjing Hu, Yuanda Cao, Jingxia Wang:
Behavioral Compatibility Analysis for Context-independent Service Substitution. ChinaGrid 2012: 121-127
2000 – 2009
- 2009
- [j1]Xing Zhao, Jingjing Hu, Peng Zhang:
GPU-Based 3D Cone-Beam CT Image Reconstruction for Large Data Volume. Int. J. Biomed. Imaging 2009: 149079:1-149079:8 (2009) - 2008
- [c5]Yong Wang, Ming Li, Eamonn Dillon, Lingguo Cui, Jingjing Hu, Lejian Liao:
A Context-aware Computational Trust Model for Multi-agent Systems. ICNSC 2008: 1119-1124 - 2007
- [c4]Yong Wang, Ming Li, Jingfeng Xue, Jingjing Hu, Longfei Zhang, Lejian Liao:
A Context-Aware Trust Establishment and Mapping Framework for Web Applications. CIS 2007: 892-896 - [c3]Jingjing Hu, Johan H. Huijsing, Kofi A. A. Makinwa:
A Three-Stage Amplifier with Quenched Multipath Frequency Compensation for All Capacitive Loads. ISCAS 2007: 225-228 - 2006
- [c2]Jingjing Hu, Joshua Sawyer, Jean-Yves Hervé:
Building Detection and Recognition for an Automated Tour Guide. SMC 2006: 283-289 - 2002
- [c1]Jingjing Hu, Xiaolan Shen, Yu Shao, Chris Bystroff, Mohammed Javeed Zaki:
Mining Protein Contact Maps. BIOKDD 2002: 3-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint