default search action
Xiaojiang Chen
- > Home > Persons > Xiaojiang Chen
Publications
- 2019
- [j50]Kang Yang, Tianzhang Xing, Yang Liu, Zhenjiang Li, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. IEEE/ACM Trans. Netw. 27(5): 2043-2055 (2019) - [c98]Jing Zhang, Ruyue Liu, Xiaoqing Gong, Feng Chen, Baoying Liu, Dingyi Fang, Jingjing Zhao, Xiaojiang Chen:
LoRaSense: An Interference-aware Concurrent Transmission Model. EWSN 2019: 330-335 - 2018
- [j43]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Comput. Secur. 74: 202-220 (2018) - [j40]Lei Wang, Xiaoqing Gong, Yongqin Zhang, Pengfei Xu, Xiaojiang Chen, Dingyi Fang, Xia Zheng, Jun Guo:
Artistic features extraction from chinese calligraphy works via regional guided filter with reference image. Multim. Tools Appl. 77(3): 2973-2990 (2018) - [c88]Pengfei Xu, Lei Wang, Ziyu Guan, Xia Zheng, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Xiaoqing Gong, Zheng Wang:
Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach. IJCAI 2018: 1050-1056 - [c83]Kang Yang, Xiaoqing Gong, Yang Liu, Zhenjiang Li, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. SECON 2018: 190-198 - 2017
- [j33]Zhaoqiang Wang, Jingjing Zhao, Xiaojiang Chen, Xiaoqing Gong, Zhanyong Tang, Chen Liu, Dingyi Fang:
Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(1-2): 41-66 (2017) - [j29]Zhanyong Tang, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, Zheng Wang:
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes. Mob. Inf. Syst. 2017: 1248578:1-1248578:14 (2017) - [c80]Jie Zhang, Zhanyong Tang, Rong Li, Xiaojiang Chen, Xiaoqing Gong, Dingyi Fang, Zheng Wang:
Protect Sensitive Information against Channel State Information Based Attacks. CSE/EUC (2) 2017: 203-210 - [c77]Lina Song, Zhanyong Tang, Zhen Li, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Zheng Wang:
AppIS: Protect Android Apps Against Runtime Repackaging Attacks. ICPADS 2017: 25-32 - [c76]Kang Yang, Xiaoqing Gong, Shiwei Song, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang:
SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices. ICPADS 2017: 113-120 - [c68]Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Zheng Wang:
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. TrustCom/BigDataSE/ICESS 2017: 261-268 - [c67]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Heng Zhang, Jie Liu, Zheng Wang:
Exploit dynamic data flows to protect software against semantic attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j15]Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, Feng Chen:
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality. Mob. Inf. Syst. 2016: 8793025:1-8793025:14 (2016) - [j14]Wen Cui, Xiaoqing Gong, Chen Liu, Dan Xu, Xiaojiang Chen, Dingyi Fang, Shaojie Tang, Fan Wu, Guihai Chen:
Node Immunization with Time-Sensitive Restrictions. Sensors 16(12): 2141 (2016) - [c62]Wen Cui, Xiaoqing Gong, Chen Liu, Dan Xu, Zhuang Yin, Xiaojiang Chen, Dingyi Fang:
Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective. ICPADS 2016: 368-375 - [c53]Xiaoqing Gong, Xuan Wang, Jun Guo, Anwen Wang, Dan Xu, Na An, Xiaojiang Chen, Dingyi Fang, Xia Zheng:
DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN. NaNA 2016: 77-83 - [c51]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. Trustcom/BigDataSE/ISPA 2016: 489-496 - 2015
- [j8]Zhanyong Tang, Jie Zhang, Xiaoqing Gong, Xiaohua Cheng, Xiaojiang Chen, Dingyi Fang, Wei Wang:
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 252653:1-252653:18 (2015) - 2011
- [c7]Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin:
The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring. CIS 2011: 767-770 - [c5]Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Baishun Zhou, Lang Qin:
A Reliable Transmission Protocol Based on Dynamic Link Cache. iThings/CPSCom 2011: 752-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 01:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint