


default search action
Lizhong Jin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Lizhong Jin, Rulong Fan, Xiaoling Han, Xueying Cui:
IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic. Frontiers Comput. Sci. 7 (2025) - 2023
- [j7]Xueying Cui, Yingting Guo, Wenqiang Hao, Hong Shangguan, Xiong Zhang, Bin Liu, Anhong Wang, Lizhong Jin:
Low-dose CT image denoising based on edge prior and high-frequency sensitive feature fusion network. Signal Image Video Process. 17(7): 3387-3396 (2023) - 2022
- [j6]Guangxing Guo, Yanli Zhao, Chenxu Liu, Yongcan Fu, Xinhua Xi, Lizhong Jin, Dongli Shi, Lin Wang, Yonghong Duan, Jie Huang, Shuping Tan, Guimei Yin:
Method for persistent topological features extraction of schizophrenia patients' electroencephalography signal based on persistent homology. Frontiers Comput. Neurosci. 16 (2022)
2010 – 2019
- 2019
- [j5]Lizhong Jin
, Junjie Chen, Xiaobo Zhang:
An Outlier Fuzzy Detection Method Using Fuzzy Set Theory. IEEE Access 7: 59321-59332 (2019) - [j4]Gaimei Gao, Xinguang Peng, Lizhong Jin:
Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. Int. J. Netw. Secur. 21(3): 428-437 (2019) - 2018
- [j3]Lizhong Jin, Junjie Chen, Xinguang Peng:
Joint classification of complementary features based on multitask compressive sensing with application to synthetic aperture radar automatic target recognition. J. Electronic Imaging 27(05): 053034 (2018) - 2016
- [i5]Jian Luo, Lizhong Jin, Thomas D. Nadeau, George Swallow:
Relayed Echo Reply Mechanism for Label Switched Path (LSP) Ping. RFC 7743: 1-18 (2016) - 2014
- [i4]Lizhong Jin, Frederic Jounay, IJsbrand Wijnands, Nicolai Leymann:
LDP Extensions for Hub and Spoke Multipoint Label Switched Path. RFC 7140: 1-15 (2014) - [i3]Zhihua Liu, Lizhong Jin, Ran Chen, Dennis Cai, Samer Salam:
Redundancy Mechanism for Inter-domain VPLS Service. RFC 7309: 1-12 (2014) - [i2]Raymond Key, Lucy Yong, Simon Delord, Frederic Jounay, Lizhong Jin:
A Framework for Ethernet Tree (E-Tree) Service over a Multiprotocol Label Switching (MPLS) Network. RFC 7387: 1-13 (2014) - 2012
- [j2]Lizhong Jin, Guiran Chang, Dawei Sun, Na Zhou, Jie Jia, Chunxiao Liu:
Research on hierarchical routing protocol based on optimal clustering head for wireless sensor networks. Int. J. Model. Identif. Control. 15(4): 331-337 (2012) - [j1]Dawei Sun, Guiran Chang, Shang Gao
, Lizhong Jin, Xingwei Wang:
Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments. J. Comput. Sci. Technol. 27(2): 256-272 (2012) - [i1]Lizhong Jin, Raymond Key, Simon Delord, Thomas D. Nadeau, Sami Boutros:
Update of the Pseudowire Control-Word Negotiation Mechanism. RFC 6723: 1-9 (2012) - 2011
- [c6]Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng:
Research on Architecture, Cross-Layer MAC Protocol for Wireless Sensor Networks. ICGEC 2011: 291-294 - [c5]Chunxiao Liu, Guiran Chang, Jie Jia, Lizhong Jin, Fengyun Li:
A Load Balanced Routing Protocol Based on Ant Colony Algorithm for Wireless Mesh Networks. ICGEC 2011: 295-298 - [c4]Chuan Wang, Lizhong Jin, Na Zhou:
A Vertical Search Engine for Energy Conservation and Environmental Protection. ICGEC 2011: 307-310 - [c3]Dong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, Fengyun Li:
A Novel Secure Architecture for the Internet of Things. ICGEC 2011: 311-314
2000 – 2009
- 2009
- [c2]Lizhong Jin, Jie Jia, Guiran Chang, Xingwei Wang:
Restoration of coverage blind spots in wireless sensor networks based on ant colony algorithm. GEC Summit 2009: 847-850 - [c1]Lizhong Jin, Guiran Chang, Dan Jiang, Xingwei Wang:
Research on the Discovery of Blind Spots in Wireless Sensor Networks Based on Voronoi Diagram. HIS (2) 2009: 209-214
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-28 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint