Jiandong Wang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j60]Jiandong Wang, Yan Yu, Kuang Chen:
Determining the number of segments for piece-wise linear representation of discrete-time signals. Computers & Chemical Engineering 120: 46-53 (2019) - 2018
- [j59]Lei Fang, Jiandong Wang, Xiaobo Tan:
An incremental harmonic balance-based approach for harmonic analysis of closed-loop systems with Prandtl-Ishlinskii operator. Automatica 88: 48-56 (2018) - [j58]Jiandong Wang, Jianjun Su, Yan Zhao, Donghua Zhou:
Searching historical data segments for process identification in feedback control loops. Computers & Chemical Engineering 112: 6-16 (2018) - [j57]Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang:
Privacy preserving cloud data sharing system with flexible control. Computers & Electrical Engineering 70: 978-986 (2018) - [j56]Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Cryptography 86(11): 2587-2603 (2018) - [j55]Bo Sun, Haiyan Chen, Jiandong Wang, Hua Xie:
Evolutionary under-sampling based bagging ensemble method for imbalanced data classification. Frontiers Comput. Sci. 12(2): 331-350 (2018) - [j54]Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
A proxy broadcast re-encryption for cloud data sharing. Multimedia Tools Appl. 77(9): 10455-10469 (2018) - [j53]Juan Sui, Qiming Qin, Huazhong Ren, Yuanheng Sun, Tianyuan Zhang, Jiandong Wang, Shihong Gong:
Winter Wheat Production Estimation Based on Environmental Stress Factors from Satellite Observations. Remote Sensing 10(6): 962 (2018) - [j52]Jiandong Wang, Yan Zhao, Zhenfu Bi:
Criteria and Algorithms for Online and Offline Detections of Industrial Alarm Floods. IEEE Trans. Contr. Sys. Techn. 26(5): 1722-1731 (2018) - [j51]Weiping Ding, Chin-Teng Lin, Mukesh Prasad, Zehong Cao, Jiandong Wang:
A Layered-Coevolution-Based Attribute-Boosted Reduction Using Adaptive Quantum-Behavior PSO and Its Consistent Segmentation for Neonates Brain Tissue. IEEE Trans. Fuzzy Systems 26(3): 1177-1191 (2018) - [j50]Wanqi Xiong, Jiandong Wang, Kuang Chen:
Multivariate Alarm Systems for Time-Varying Processes Using Bayesian Filters With Applications to Electrical Pumps. IEEE Trans. Industrial Informatics 14(2): 504-513 (2018) - 2017
- [j49]Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang:
Identity-based conditional proxy re-encryption with fine grain policy. Computer Standards & Interfaces 52: 1-9 (2017) - [j48]Yintong Wang, Jiandong Wang, Hao Liao, Haiyan Chen:
An efficient semi-supervised representatives feature selection algorithm based on information theory. Pattern Recognition 61: 511-523 (2017) - [j47]Yan Yu, Jiandong Wang, Zijiang Yang:
Design of Alarm Trippoints for Univariate Analog Process Variables Based on Alarm Probability Plots. IEEE Trans. Industrial Electronics 64(8): 6496-6505 (2017) - [c28]Ruobin Wang, Fengxia Li, Nannan Cheng, Bin Xiao, Jiandong Wang, Chuntao Du:
How does web-based virtual reality affect learning: evidences from a quasi-experiment. ACM TUR-C 2017: 9:1-9:7 - 2016
- [j46]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j45]Peng-Cheng Zou, Jiandong Wang, Songcan Chen, Haiyan Chen:
Margin distribution explanation on metric learning for nearest neighbor classification. Neurocomputing 177: 168-178 (2016) - [j44]Weiping Ding, Jiehua Wang, Jiandong Wang:
A hierarchical-coevolutionary-MapReduce-based knowledge reduction algorithm with robust ensemble Pareto equilibrium. Inf. Sci. 342: 153-175 (2016) - [j43]Bo Sun, Songcan Chen, Jiandong Wang, Haiyan Chen:
A robust multi-class AdaBoost algorithm for mislabeled noisy data. Knowl.-Based Syst. 102: 87-102 (2016) - [j42]Zhengtao Liu, Jiandong Wang:
A fine-grained context-aware access control model for health care and life science linked data. Multimedia Tools Appl. 75(22): 14263-14280 (2016) - [j41]Jiandong Wang, Fan Yang, Tongwen Chen, Sirish L. Shah:
An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems. IEEE Trans. Automation Science and Engineering 13(2): 1045-1061 (2016) - [j40]Li Tang, Jiandong Wang:
Estimation of the Most Critical Parameter for the Two-Movement Method to Compensate for Oscillations Caused by Control Valve Stiction. IEEE Trans. Contr. Sys. Techn. 24(5): 1869-1874 (2016) - [c27]Lei Fang, Jiandong Wang, Xiaobo Tan, Qunli Shang:
Analysis and compensation of control valve stiction-induced limit cycles. AIM 2016: 1688-1693 - [c26]Lei Fang, Jiandong Wang, Xiaobo Tan:
Frequency response analysis for closed-loop systems with hysteresis using incremental harmonic balance. ACC 2016: 1305-1310 - [c25]Xia Zhang, Zhengyou Xia, Jiandong Wang:
Local Community Detection Based on Bridges Ideas. DMBD 2016: 409-415 - 2015
- [j39]Wenkai Hu, Jiandong Wang, Tongwen Chen:
A new method to detect and quantify correlated alarms with occurrence delays. Computers & Chemical Engineering 80: 189-198 (2015) - [j38]Yintong Wang, Jiandong Wang, Haiyan Chen, Bo Sun:
Semi-Supervised Local Fisher Discriminant Analysis Based on Reconstruction Probability Class. IJPRAI 29(2) (2015) - [j37]Weiping Ding, Zhijin Guan, Quan Shi, Jiandong Wang:
A more efficient attribute self-adaptive co-evolutionary reduction algorithm by combining quantum elitist frogs and cloud model operators. Inf. Sci. 293: 214-234 (2015) - [j36]Bo Sun, Haiyan Chen, Jiandong Wang:
An empirical margin explanation for the effectiveness of DECORATE ensemble learning algorithm. Knowl.-Based Syst. 78: 1-12 (2015) - [j35]Jiandong Wang, Qinghua Zhang:
Identification of FIR Systems Based on Quantized Output Measurements: A Quadratic Programming-Based Method. IEEE Trans. Automat. Contr. 60(5): 1439-1444 (2015) - [c24]Haiyan Chen, Jiajia Deng, Bo Sun, Jiandong Wang:
An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR. ICCCS 2015: 536-549 - 2014
- [j34]Jiandong Wang, Tongwen Chen:
An online method to remove chattering and repeating alarms based on alarm durations and intervals. Computers & Chemical Engineering 67: 43-52 (2014) - [j33]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
An FAR-SW based approach for webpage information extraction. Information Systems Frontiers 16(5): 771-785 (2014) - [j32]Peng-Cheng Zou, Jiandong Wang, Songcan Chen, Haiyan Chen:
Bagging-like metric learning for support vector regression. Knowl.-Based Syst. 65: 21-30 (2014) - [c23]Hong Song, Qian Zhang, Feifei Sun, Jiandong Wang, Quansheng Wang, Jingdan Qiu, Deqiang Kou:
Breast tissue segmentation on MR images using KFCM with spatial constraints. GrC 2014: 254-258 - 2013
- [j31]Jiandong Wang, Tongwen Chen:
An online method for detection and reduction of chattering alarms due to oscillation. Computers & Chemical Engineering 54: 140-150 (2013) - [j30]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Fuzzy conditional proxy re-encryption. SCIENCE CHINA Information Sciences 56(5): 1-13 (2013) - [j29]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238: 221-241 (2013) - [j28]
- [j27]Zhan Bu, Zhengyou Xia, Jiandong Wang:
A sock puppet detection algorithm on virtual spaces. Knowl.-Based Syst. 37: 366-377 (2013) - [j26]Weiping Ding, Jiandong Wang:
A novel approach to minimum attribute reduction based on quantum-inspired self-adaptive cooperative co-evolution. Knowl.-Based Syst. 50: 1-13 (2013) - [j25]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network. Knowl.-Based Syst. 50: 246-259 (2013) - [j24]Zijiang Yang, Jiandong Wang, Tongwen Chen:
Detection of Correlated Alarms Based on Similarity Coefficients of Binary Data. IEEE Trans. Automation Science and Engineering 10(4): 1014-1025 (2013) - [c22]Weiping Ding, Quan Shi, Senbo Chen, Zhijin Guan, Jiandong Wang:
A novel quantum cooperative co-evolutionary algorithm for large-scale minimum attribute reduction optimization. CIDM 2013: 280-286 - [c21]Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
Current Attitude Prediction Model Based on Game Theory. WISE (2) 2013: 469-478 - 2012
- [j23]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Hierarchical conditional proxy re-encryption. Computer Standards & Interfaces 34(4): 380-389 (2012) - [j22]Lina Wang, Jiandong Wang:
Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets. IJPRAI 26(4) (2012) - [j21]Haiyan Chen, Jiandong Wang, Lirong Feng:
Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction. JSW 7(2): 263-268 (2012) - [j20]Bin Gu, Jiandong Wang, Yuecheng Yu, Guansheng Zheng, Yu-Fan Huang, Tao Xu:
Accurate on-line v-support vector learning. Neural Networks 27: 51-59 (2012) - [j19]Jianwei Xu, Jiandong Wang, Iman Izadi, Tongwen Chen:
Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD. IEEE Trans. Automation Science and Engineering 9(2): 296-307 (2012) - [j18]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 462: 39-58 (2012) - [j17]Bin Gu, Jiandong Wang, Guansheng Zheng, Yuecheng Yu:
Regularization Path for ν-Support Vector Classification. IEEE Trans. Neural Netw. Learning Syst. 23(5): 800-811 (2012) - 2011
- [j16]Feng Pan, Jiandong Wang, Xiaohui Lin:
Local margin based semi-supervised discriminant embedding for visual recognition. Neurocomputing 74(5): 812-819 (2011) - [j15]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software 84(12): 2293-2302 (2011) - [c20]Wenshui Lin, Jinping Xu, Jiandong Wang, Xinyou Wu:
A Bricklaying Best-Fit Heuristic Algorithm for the Orthogonal Rectangle Packing Problem. ICAIC (2) 2011: 638-643 - [c19]Jiandong Wang, Xinhu Wang:
Elasto-plastic Collapse Strength Calculation of Casing under Pure External Pressure. ICDMA 2011: 498-501 - 2010
- [j14]Chunyun Yan, Jiandong Wang, Qinghua Zhang:
Subspace identification methods for Hammerstein systems: rank constraint and dimension problem. Int. J. Control 83(11): 2204-2216 (2010) - [j13]Bin Gu, Jiandong Wang, Tao Li:
Ordinal-Class Core Vector Machine. J. Comput. Sci. Technol. 25(4): 699-708 (2010) - [j12]Yao Rong, Jiandong Wang:
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform. JDCTA 4(9): 68-79 (2010) - [j11]Xin-feng Zhu, Jiandong Wang, Bin Li:
Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals. JDCTA 4(9): 123-131 (2010) - [j10]Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu:
Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning. JDCTA 4(9): 132-140 (2010) - [j9]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Decryptable Public Key Encryption with Keyword Search Schemes. JDCTA 4(9): 141-150 (2010) - [j8]Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. JDCTA 4(9): 151-160 (2010) - [c18]Jianwei Xu, Jiandong Wang:
Averaged alarm delay and systematic design for alarm systems. CDC 2010: 6821-6826 - [c17]Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480
2000 – 2009
- 2009
- [j7]Jiandong Wang, Qinghua Zhang, Lennart Ljung:
Revisiting Hammerstein system identification through the Two-Stage Algorithm for bilinear parameter estimation. Automatica 45(11): 2627-2633 (2009) - [j6]Jiandong Wang, Wei Xing Zheng, Tongwen Chen:
Identification of linear dynamic systems operating in a networked environment. Automatica 45(12): 2763-2772 (2009) - [j5]Jiandong Wang, Akira Sano, Tongwen Chen, Biao Huang:
Identification of Hammerstein systems without explicit parameterisation of non-linearity. Int. J. Control 82(5): 937-952 (2009) - [j4]Junwu Zhu, Jiandong Wang, Bin Li:
A formal method for integrating distributed ontologies and reducing the redundant relations. Kybernetes 38(10): 1870-1879 (2009) - [c16]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258 - [c15]Jiandong Wang, Wei Xing Zheng, Tongwen Chen:
On system identification in a networked environment. CDC 2009: 2610-2615 - [c14]Jiandong Wang, Qinghua Zhang, Lennart Ljung:
Revisiting the Two-Stage Algorithm for Hammerstein system identification. CDC 2009: 3620-3625 - [c13]Zhigang Zhai, Jiandong Wang, Yuguang Mao:
Study and Safety Analysis on UCONonA Model. DBTA 2009: 103-106 - [c12]Jiandong Wang, Yingke Xie, Chao Zhu, Zili Zhao, Chengde Han:
An Embedded Load Balancing System for High Speed OC192 Networks. ICESS 2009: 587-592 - [c11]Liming Fang, Willy Susilo, Jiandong Wang:
Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60 - 2008
- [c10]Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu:
Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239 - [c9]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. CIS (1) 2008: 326-330 - [c8]Haiyan Chen, Jiandong Wang, Xuefeng Yan:
A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning. FSKD (3) 2008: 331-335 - [c7]Bin Gu, Jiandong Wang, Haiyan Chen:
On-line off-line Ranking Support Vector Machine and analysis. IJCNN 2008: 1364-1369 - [i2]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptology ePrint Archive 2008: 139 (2008) - [i1]Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian:
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptology ePrint Archive 2008: 479 (2008) - 2007
- [j3]Jiandong Wang, Akira Sano, David S. Shook, Tongwen Chen, Biao Huang:
A blind approach to closed-loop identification of Hammerstein systems. Int. J. Control 80(2): 302-313 (2007) - [c6]Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:
Identity-Based Key Issuing Protocol for Ad Hoc Networks. CIS 2007: 917-921 - [c5]Junwu Zhu, Jiandong Wang, Bin Li:
On Dynamic and Concurrent Model of Web Service Components. CSCWD 2007: 568-572 - [c4]Junwu Zhu, Jiandong Wang, Bin Li:
SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System. CSCWD 2007: 573-576 - 2006
- [j2]Jiandong Wang, Tongwen Chen, Biao Huang:
Cyclo-period estimation for discrete-time cyclo-stationary signals. IEEE Trans. Signal Processing 54(1): 83-94 (2006) - [c3]Junwu Zhu, Jiandong Wang, Li Bin, Jiang Yi:
On Semantic-based cooperation among Web Services. CSCWD 2006: 700-703 - 2005
- [j1]Jiandong Wang, Tongwen Chen, Biao Huang:
On spectral theory of cyclostationary signals in multirate systems. IEEE Trans. Signal Processing 53(7): 2421-2431 (2005) - [c2]Feiyue Ye, Jiandong Wang, Shiliang Wu, Huiping Chen, Tianqiang Huang, Li Tao:
An Integrated Approach for Mining Meta-rules. MLDM 2005: 549-557
1990 – 1999
- 1991
- [c1]Sylvain Delisle, Stan Matwin, Jiandong Wang, Lionel Zupan:
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts. ISMIS 1991: 326-337
Coauthor Index
last updated on 2019-01-09 01:01 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint