


default search action
Xiao-Bo Jin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j26]Shi-Jie Xu [j26]Shi-Jie Xu , Kai-Chuan Kong , Kai-Chuan Kong , Xiao-Bo Jin, Guang-Gang Geng , Xiao-Bo Jin, Guang-Gang Geng : :
 Unveiling traffic paths: Explainable path signature feature-based encrypted traffic classification. Comput. Secur. 150: 104283 (2025)
 [j25]Zhiying Li [j25]Zhiying Li , Junhao Wu , Junhao Wu , Shuyuan Lin, Zheng Wang, Xiaobo Jin , Shuyuan Lin, Zheng Wang, Xiaobo Jin , Guanggang Geng, Feiran Huang, Jian Weng: , Guanggang Geng, Feiran Huang, Jian Weng:
 Progressive Enhancement Dehazing for object detection in extreme weather. Eng. Appl. Artif. Intell. 155: 110903 (2025)
 [j24]Kai-Chuan Kong [j24]Kai-Chuan Kong , Xiaobo Jin , Xiaobo Jin , Dongjie Liu, Shijie Xu , Dongjie Liu, Shijie Xu , Zhiquan Liu , Zhiquan Liu , Guanggang Geng , Guanggang Geng : :
 DPI-ITD: A Dual-Perspective Information-Driven Framework for Insider Threat Detection in IoT Systems. IEEE Internet Things J. 12(19): 40731-40749 (2025)
 [j23]Fukai Zhang [j23]Fukai Zhang , Xiaobo Jin, Jie Jiang, Gang Lin, Mingzhi Wang, Shan An, Qiang Lyu: , Xiaobo Jin, Jie Jiang, Gang Lin, Mingzhi Wang, Shan An, Qiang Lyu:
 Fine-grained recognition of citrus varieties via wavelet channel attention network. Knowl. Based Syst. 311: 113128 (2025)
 [j22]Rong-Hao Hou, Dongjie Liu, Xiaobo Jin, Jian Weng, Guanggang Geng: [j22]Rong-Hao Hou, Dongjie Liu, Xiaobo Jin, Jian Weng, Guanggang Geng:
 A malware detection method with function parameters encoding and function dependency modeling. PeerJ Comput. Sci. 11: e2946 (2025)
 [c30]Xiaoqiang Kang, Zimu Wang, Xiaobo Jin, Wei Wang, Kaizhu Huang, Qiufeng Wang: [c30]Xiaoqiang Kang, Zimu Wang, Xiaobo Jin, Wei Wang, Kaizhu Huang, Qiufeng Wang:
 Template-Driven LLM-Paraphrased Framework for Tabular Math Word Problem Generation. AAAI 2025: 24303-24311
 [c29]Xun Chen, Yushi Li, Yunyao Shen, Rong Chen, Chao Xu, Xiaobo Jin, Along Jin, Yu Han: [c29]Xun Chen, Yushi Li, Yunyao Shen, Rong Chen, Chao Xu, Xiaobo Jin, Along Jin, Yu Han:
 ShadowCraft-NeRF: Occlusion and Shadow Mitigation via SAM-Guided NeRF. CASA 2025: 93-108
 [c28]Shreyank N. Gowda, Boyan Gao, Xiao Gu, Xiao-Bo Jin: [c28]Shreyank N. Gowda, Boyan Gao, Xiao Gu, Xiao-Bo Jin:
 Is Temporal Prompting All We Need For Limited Labeled Action Recognition? CVPR Workshops 2025: 682-692
 [c27]Zihan Ye, Shreyank N. Gowda, Shiming Chen, Xiaowei Huang, Haotian Xu, Fahad Shahbaz Khan, Yaochu Jin, Kaizhu Huang, Xiaobo Jin: [c27]Zihan Ye, Shreyank N. Gowda, Shiming Chen, Xiaowei Huang, Haotian Xu, Fahad Shahbaz Khan, Yaochu Jin, Kaizhu Huang, Xiaobo Jin:
 ZeroDiff: Solidified Visual-semantic Correlation in Zero-Shot Learning. ICLR 2025
 [i35]Shreyank N. Gowda, Boyan Gao, Xiao Gu, Xiaobo Jin: [i35]Shreyank N. Gowda, Boyan Gao, Xiao Gu, Xiaobo Jin:
 Is Temporal Prompting All We Need For Limited Labeled Action Recognition? CoRR abs/2504.01890 (2025)
 [i34]Xiaobo Jin, JiaShu Tu: [i34]Xiaobo Jin, JiaShu Tu:
 Accelerating Evolution: Integrating PSO Principles into Real-Coded Genetic Algorithm Crossover. CoRR abs/2505.03217 (2025)
 [i33]Zihan Ye, Shreyank N. Gowda, Shiming Chen, Yaochu Jin, Kaizhu Huang, Xiaobo Jin: [i33]Zihan Ye, Shreyank N. Gowda, Shiming Chen, Yaochu Jin, Kaizhu Huang, Xiaobo Jin:
 Interpretable Zero-shot Learning with Infinite Class Concepts. CoRR abs/2505.03361 (2025)
 [i32]Xiang Li, Chong Zhang, Jia Wang, Fangyu Wu, Yushi Li, Xiaobo Jin: [i32]Xiang Li, Chong Zhang, Jia Wang, Fangyu Wu, Yushi Li, Xiaobo Jin:
 Efficient and Stealthy Jailbreak Attacks via Adversarial Prompt Distillation from LLMs to SLMs. CoRR abs/2506.17231 (2025)
 [i31]Chong Zhang, Xiang Li, Jia Wang, Shan Liang, Haochen Xue, Xiaobo Jin: [i31]Chong Zhang, Xiang Li, Jia Wang, Shan Liang, Haochen Xue, Xiaobo Jin:
 Semantic-Preserving Adversarial Attacks on LLMs: An Adaptive Greedy Binary Search Approach. CoRR abs/2506.18756 (2025)
 [i30]Shreyank N. Gowda, Xiaobo Jin, Christian Wagner: [i30]Shreyank N. Gowda, Xiaobo Jin, Christian Wagner:
 Prototype-Enhanced Confidence Modeling for Cross-Modal Medical Image-Report Retrieval. CoRR abs/2508.03494 (2025)
 [i29]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Guanggang Geng, Zhiying Li, Jian Weng: [i29]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Guanggang Geng, Zhiying Li, Jian Weng:
 DMFI: Dual-Modality Fine-Tuning and Inference Framework for LLM-Based Insider Threat Detection. CoRR abs/2508.05694 (2025)
 [i28]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng, Jian Weng: [i28]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng, Jian Weng:
 MambaITD: An Efficient Cross-Modal Mamba Network for Insider Threat Detection. CoRR abs/2508.05695 (2025)
 [i27]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng: [i27]Kai-Chuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng:
 Log2Sig: Frequency-Aware Insider Threat Detection via Multivariate Behavioral Signal Decomposition. CoRR abs/2508.05696 (2025)
 [i26]Xiang Li, Chong Zhang, Hongpeng Wang, Shreyank Narayana Gowda, Yushi Li, Xiaobo Jin: [i26]Xiang Li, Chong Zhang, Hongpeng Wang, Shreyank Narayana Gowda, Yushi Li, Xiaobo Jin:
 Performance is not All You Need: Sustainability Considerations for Algorithms. CoRR abs/2509.00045 (2025)
 [i25]Xiaoqiang Kang, Shengen Wu, Zimu Wang, Yilin Liu, Xiaobo Jin, Kaizhu Huang, Wei Wang, Yutao Yue, Xiaowei Huang, Qiufeng Wang: [i25]Xiaoqiang Kang, Shengen Wu, Zimu Wang, Yilin Liu, Xiaobo Jin, Kaizhu Huang, Wei Wang, Yutao Yue, Xiaowei Huang, Qiufeng Wang:
 Can GRPO Boost Complex Multimodal Table Understanding? CoRR abs/2509.16889 (2025)
- 2024
 [j21]Fukai Zhang [j21]Fukai Zhang , Xiaobo Jin, Gang Lin, Jie Jiang, Mingzhi Wang, Shan An, Junhua Hu, Qiang Lyu: , Xiaobo Jin, Gang Lin, Jie Jiang, Mingzhi Wang, Shan An, Junhua Hu, Qiang Lyu:
 Hybrid attention network for citrus disease identification. Comput. Electron. Agric. 220: 108907 (2024)
 [j20]Fei-Fan Tu, Dongjie Liu, Zhiwei Yan, Xiao-Bo Jin [j20]Fei-Fan Tu, Dongjie Liu, Zhiwei Yan, Xiao-Bo Jin , Guang-Gang Geng: , Guang-Gang Geng:
 STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems. Comput. Secur. 144: 103961 (2024)
 [j19]Hua Tang, Chong Zhang [j19]Hua Tang, Chong Zhang , Mingyu Jin, Qinkai Yu, Zhenting Wang, Xiaobo Jin, Yongfeng Zhang, Mengnan Du: , Mingyu Jin, Qinkai Yu, Zhenting Wang, Xiaobo Jin, Yongfeng Zhang, Mengnan Du:
 Time Series Forecasting with LLMs: Understanding and Enhancing Model Capabilities. SIGKDD Explor. 26(2): 109-118 (2024)
 [j18]Xiaobo Jin, Ming Zhang [j18]Xiaobo Jin, Ming Zhang , Rui Yan , Rui Yan , Gang Pan , Gang Pan , De Ma , De Ma : :
 R-SNN: Region-Based Spiking Neural Network for Object Detection. IEEE Trans. Cogn. Dev. Syst. 16(3): 810-817 (2024)
 [c26]Chong Zhang [c26]Chong Zhang , Mingyu Jin, Qinkai Yu, Haochen Xue, Shreyank N. Gowda , Mingyu Jin, Qinkai Yu, Haochen Xue, Shreyank N. Gowda , Xiaobo Jin , Xiaobo Jin : :
 Bridging the Projection Gap: Overcoming Projection Bias Through Parameterized Distance Learning. ACCV (8) 2024: 246-262
 [c25]Chong Zhang [c25]Chong Zhang , Mingyu Jin, Dong Shu, Taowen Wang, Dongfang Liu, Xiaobo Jin: , Mingyu Jin, Dong Shu, Taowen Wang, Dongfang Liu, Xiaobo Jin:
 Target-driven Attack for Large Language Models. ECAI 2024: 1752-1759
 [c24]Shreyank N. Gowda, Xinyue Hao, Gen Li, Shashank Narayana Gowda, Xiaobo Jin, Laura Sevilla-Lara: [c24]Shreyank N. Gowda, Xinyue Hao, Gen Li, Shashank Narayana Gowda, Xiaobo Jin, Laura Sevilla-Lara:
 Watt for What: Rethinking Deep Learning's Energy-Performance Relationship. ECCV Workshops (22) 2024: 388-405
 [c23]Chong Zhang [c23]Chong Zhang , Mingyu Jin, Qinkai Yu, Chengzhi Liu, Haochen Xue, Xiaobo Jin: , Mingyu Jin, Qinkai Yu, Chengzhi Liu, Haochen Xue, Xiaobo Jin:
 Goal-Guided Generative Prompt Injection Attack on Large Language Models. ICDM 2024: 941-946
 [c22]Haochen Xue, Chong Zhang [c22]Haochen Xue, Chong Zhang , Chenzhi Liu, Fangyu Wu, Xiaobo Jin: , Chenzhi Liu, Fangyu Wu, Xiaobo Jin:
 Multi-task Prompt Words Learning for Social Media Content Generation. IJCNN 2024: 1-8
 [i24]Shreyank N. Gowda, Yash Thakre, Shashank Narayana Gowda, Xiaobo Jin: [i24]Shreyank N. Gowda, Yash Thakre, Shashank Narayana Gowda, Xiaobo Jin:
 Reimagining Reality: A Comprehensive Survey of Video Inpainting Techniques. CoRR abs/2401.17883 (2024)
 [i23]Chong Zhang, Mingyu Jin, Qinkai Yu, Chengzhi Liu, Haochen Xue, Xiaobo Jin: [i23]Chong Zhang, Mingyu Jin, Qinkai Yu, Chengzhi Liu, Haochen Xue, Xiaobo Jin:
 Goal-guided Generative Prompt Injection Attack on Large Language Models. CoRR abs/2404.07234 (2024)
 [i22]Zihan Ye, Shreyank N. Gowda, Xiaobo Jin, Xiaowei Huang, Haotian Xu, Yaochu Jin, Kaizhu Huang: [i22]Zihan Ye, Shreyank N. Gowda, Xiaobo Jin, Xiaowei Huang, Haotian Xu, Yaochu Jin, Kaizhu Huang:
 Exploring Data Efficiency in Zero-Shot Learning with Diffusion Models. CoRR abs/2406.02929 (2024)
 [i21]Zile Huang, Chong Zhang, Mingyu Jin, Fangyu Wu, Chengzhi Liu, Xiaobo Jin: [i21]Zile Huang, Chong Zhang, Mingyu Jin, Fangyu Wu, Chengzhi Liu, Xiaobo Jin:
 Better Sampling, towards Better End-to-end Small Object Detection. CoRR abs/2407.06127 (2024)
 [i20]Haochen Xue, Chong Zhang, Chengzhi Liu, Fangyu Wu, Xiaobo Jin: [i20]Haochen Xue, Chong Zhang, Chengzhi Liu, Fangyu Wu, Xiaobo Jin:
 Multi-task Prompt Words Learning for Social Media Content Generation. CoRR abs/2407.07771 (2024)
 [i19]Chong Zhang, Xinyi Liu, Mingyu Jin, Zhongmou Zhang, Lingyao Li, Zhenting Wang, Wenyue Hua, Dong Shu, Suiyuan Zhu, Xiaobo Jin, Sujian Li, Mengnan Du, Yongfeng Zhang: [i19]Chong Zhang, Xinyi Liu, Mingyu Jin, Zhongmou Zhang, Lingyao Li, Zhenting Wang, Wenyue Hua, Dong Shu, Suiyuan Zhu, Xiaobo Jin, Sujian Li, Mengnan Du, Yongfeng Zhang:
 When AI Meets Finance (StockAgent): Large Language Model-based Stock Trading in Simulated Real-world Environments. CoRR abs/2407.18957 (2024)
 [i18]Chong Zhang, Mingyu Jin, Dong Shu, Taowen Wang, Dongfang Liu, Xiaobo Jin: [i18]Chong Zhang, Mingyu Jin, Dong Shu, Taowen Wang, Dongfang Liu, Xiaobo Jin:
 Target-driven Attack for Large Language Models. CoRR abs/2411.07268 (2024)
 [i17]Zhiying Li, Zhi Liu, Guanggang Geng, Shreyank N. Gowda, Shuyuan Lin, Jian Weng, Xiaobo Jin: [i17]Zhiying Li, Zhi Liu, Guanggang Geng, Shreyank N. Gowda, Shuyuan Lin, Jian Weng, Xiaobo Jin:
 Twin Trigger Generative Networks for Backdoor Attacks against Object Detection. CoRR abs/2411.15439 (2024)
 [i16]Zhiying Li, Zhi Liu, Dongjie Liu, Shengda Zhuo, Guanggang Geng, Jian Weng, Shanxiang Lyu [i16]Zhiying Li, Zhi Liu, Dongjie Liu, Shengda Zhuo, Guanggang Geng, Jian Weng, Shanxiang Lyu , Xiaobo Jin: , Xiaobo Jin:
 Unveiling the Achilles' Heel: Backdoor Watermarking Forgery Attack in Public Dataset Protection. CoRR abs/2411.15450 (2024)
 [i15]Yi-Xiang Lu, Xiao-Bo Jin, Jian Chen, Dongjie Liu, Guang-Gang Geng: [i15]Yi-Xiang Lu, Xiao-Bo Jin, Jian Chen, Dongjie Liu, Guang-Gang Geng:
 F-SE-LSTM: A Time Series Anomaly Detection Method with Frequency Domain Information. CoRR abs/2412.02474 (2024)
 [i14]Xiaoqiang Kang, Zimu Wang, Xiaobo Jin, Wei Wang, Kaizhu Huang, Qiufeng Wang: [i14]Xiaoqiang Kang, Zimu Wang, Xiaobo Jin, Wei Wang, Kaizhu Huang, Qiufeng Wang:
 Template-Driven LLM-Paraphrased Framework for Tabular Math Word Problem Generation. CoRR abs/2412.15594 (2024)
 [i13]Zihan Ye, Xinyuan Ru [i13]Zihan Ye, Xinyuan Ru , Shiming Chen, Yaochu Jin, Kaizhu Huang, Xiaobo Jin: , Shiming Chen, Yaochu Jin, Kaizhu Huang, Xiaobo Jin:
 Improved Feature Generating Framework for Transductive Zero-shot Learning. CoRR abs/2412.18282 (2024)
- 2023
 [j17]Zihan Ye [j17]Zihan Ye , Guanyu Yang , Guanyu Yang , Xiaobo Jin, Youfa Liu , Xiaobo Jin, Youfa Liu , Kaizhu Huang , Kaizhu Huang : :
 Rebalanced Zero-Shot Learning. IEEE Trans. Image Process. 32: 4185-4198 (2023)
 [c21]Yiming Lin [c21]Yiming Lin , Xiao-Bo Jin, Qiufeng Wang, Kaizhu Huang: , Xiao-Bo Jin, Qiufeng Wang, Kaizhu Huang:
 Context Does Matter: End-to-end Panoptic Narrative Grounding with Deformable Attention Refined Matching Network. ICDM 2023: 1163-1168
 [c20]Kai-Chuan Kong [c20]Kai-Chuan Kong , Yi-Xiang Lu , Yi-Xiang Lu , Guang-Gang Geng , Guang-Gang Geng , Xiao-Bo Jin , Xiao-Bo Jin : :
 Petri Net-Based Multi-Module Optimization Scheduling Strategy for Combinatorial Equipment. ICEA 2023: 90-95
 [c19]Fei-Fan Tu [c19]Fei-Fan Tu , Yan-Ming Huang , Yan-Ming Huang , Rong-Hao Hou , Rong-Hao Hou , Dongjie Liu , Dongjie Liu , Xiao-Bo Jin , Xiao-Bo Jin , Guang-Gang Geng , Guang-Gang Geng : :
 Production Resource Scheduling for Industrial Internet Products Based on Finite State Automata and Critical Locks. ICEA 2023: 115-120
 [c18]Fukai Zhang, Xiaobo Jin, Jie Jiang, Shan An, Qiang Lyu: [c18]Fukai Zhang, Xiaobo Jin, Jie Jiang, Shan An, Qiang Lyu:
 WCANet: Wavelet Channel Attention Network for Citrus Variety Identification. ICIP 2023: 2845-2849
 [c17]Haochen Xue, Mingyu Jin, Chong Zhang, Yuxuan Huang, Qian Weng, Xiaobo Jin: [c17]Haochen Xue, Mingyu Jin, Chong Zhang, Yuxuan Huang, Qian Weng, Xiaobo Jin:
 Image Blending Algorithm with Automatic Mask Generation. ICONIP (8) 2023: 234-248
 [i12]Haochen Xue, Mingyu Jin, Chong Zhang, Yuxuan Huang, Qian Weng, Xiaobo Jin: [i12]Haochen Xue, Mingyu Jin, Chong Zhang, Yuxuan Huang, Qian Weng, Xiaobo Jin:
 Automatic Image Blending Algorithm Based on SAM and DINO. CoRR abs/2306.05382 (2023)
 [i11]Mingyu Jin, Chong Zhang, Qinkai Yu, Haochen Xue, Xiaobo Jin, Xi Yang: [i11]Mingyu Jin, Chong Zhang, Qinkai Yu, Haochen Xue, Xiaobo Jin, Xi Yang:
 A Simple and Effective Baseline for Attentional Generative Adversarial Networks. CoRR abs/2306.14708 (2023)
 [i10]Chong Zhang, Mingyu Jin, Qinkai Yu, Haochen Xue, Xiaobo Jin: [i10]Chong Zhang, Mingyu Jin, Qinkai Yu, Haochen Xue, Xiaobo Jin:
 Metric Learning for Projections Bias of Generalized Zero-shot Learning. CoRR abs/2309.01390 (2023)
 [i9]Yiming Lin, Xiao-Bo Jin, Qiufeng Wang, Kaizhu Huang: [i9]Yiming Lin, Xiao-Bo Jin, Qiufeng Wang, Kaizhu Huang:
 Context Does Matter: End-to-end Panoptic Narrative Grounding with Deformable Attention Refined Matching Network. CoRR abs/2310.16616 (2023)
- 2022
 [j16]Xiaobo Jin, Jianyu Miao, Qiufeng Wang, Guanggang Geng, Kaizhu Huang: [j16]Xiaobo Jin, Jianyu Miao, Qiufeng Wang, Guanggang Geng, Kaizhu Huang:
 Sparse matrix factorization with L2, 1 norm for matrix completion. Pattern Recognit. 127: 108655 (2022)
 [j15]Shi-Jie Xu [j15]Shi-Jie Xu , Guang-Gang Geng , Guang-Gang Geng , Xiao-Bo Jin , Xiao-Bo Jin , Dongjie Liu , Dongjie Liu , Jian Weng , Jian Weng : :
 Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. IEEE Trans. Inf. Forensics Secur. 17: 2166-2181 (2022)
 [j14]Haotian Xu [j14]Haotian Xu , Xiaobo Jin , Xiaobo Jin , Qiufeng Wang , Qiufeng Wang , Amir Hussain , Amir Hussain , Kaizhu Huang , Kaizhu Huang : :
 Exploiting Attention-Consistency Loss For Spatial-Temporal Stream Action Recognition. ACM Trans. Multim. Comput. Commun. Appl. 18(2s): 119:1-119:15 (2022)
 [c16]Yijie Hu, Bin Dong, Qiufeng Wang, Lei Ding, Xiaobo Jin, Kaizhu Huang: [c16]Yijie Hu, Bin Dong, Qiufeng Wang, Lei Ding, Xiaobo Jin, Kaizhu Huang:
 Towards Accurate Alignment and Sufficient Context in Scene Text Recognition. ICONIP (3) 2022: 705-717
 [i8]Zihan Ye, Guanyu Yang, Xiaobo Jin, Youfa Liu, Kaizhu Huang: [i8]Zihan Ye, Guanyu Yang, Xiaobo Jin, Youfa Liu, Kaizhu Huang:
 Rebalanced Zero-shot Learning. CoRR abs/2210.07031 (2022)
- 2021
 [j13]Dongjie Liu, Guang-Gang Geng [j13]Dongjie Liu, Guang-Gang Geng , Xiao-Bo Jin, Wei Wang: , Xiao-Bo Jin, Wei Wang:
 An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment. Comput. Secur. 110: 102421 (2021)
 [j12]Jianyu Miao, Yuan Ping [j12]Jianyu Miao, Yuan Ping , Zhensong Chen, Xiao-Bo Jin, Peijia Li, Lingfeng Niu: , Zhensong Chen, Xiao-Bo Jin, Peijia Li, Lingfeng Niu:
 Unsupervised feature selection by non-convex regularized self-representation. Expert Syst. Appl. 173: 114643 (2021)
- 2020
 [c15]Haotian Xu, Xiaobo Jin, Qiufeng Wang, Kaizhu Huang [c15]Haotian Xu, Xiaobo Jin, Qiufeng Wang, Kaizhu Huang : :
 Multi-scale Attention Consistency for Multi-label Image Classification. ICONIP (4) 2020: 815-823
2010 – 2019
- 2019
 [j11]Guang-Gang Geng [j11]Guang-Gang Geng , Zhiwei Yan, Jong-Hyouk Lee, Xiao-Bo Jin, Dongjie Liu: , Zhiwei Yan, Jong-Hyouk Lee, Xiao-Bo Jin, Dongjie Liu:
 An Efficient Antiphishing Method to Secure eConsume. IEEE Consumer Electron. Mag. 8(6): 42-46 (2019)
 [j10]Xiao-Bo Jin, Guo-Sen Xie [j10]Xiao-Bo Jin, Guo-Sen Xie , Kaizhu Huang , Kaizhu Huang , Heling Cao, Qiu-Feng Wang: , Heling Cao, Qiu-Feng Wang:
 Discriminant Zero-Shot Learning with Center Loss. Cogn. Comput. 11(4): 503-512 (2019)
 [j9]Jianyu Miao, Heling Cao, Xiao-Bo Jin, Rongrong Ma, Xuan Fei, Lingfeng Niu: [j9]Jianyu Miao, Heling Cao, Xiao-Bo Jin, Rongrong Ma, Xuan Fei, Lingfeng Niu:
 Joint Sparse Regularization for Dictionary Learning. Cogn. Comput. 11(5): 697-710 (2019)
 [j8]Xiao-Bo Jin [j8]Xiao-Bo Jin , Xu-Yao Zhang , Xu-Yao Zhang , Kaizhu Huang , Kaizhu Huang , Guang-Gang Geng , Guang-Gang Geng : :
 Stochastic Conjugate Gradient Algorithm With Variance Reduction. IEEE Trans. Neural Networks Learn. Syst. 30(5): 1360-1369 (2019)
 [c14]Guo-Sen Xie [c14]Guo-Sen Xie , Li Liu, Xiaobo Jin, Fan Zhu, Zheng Zhang , Li Liu, Xiaobo Jin, Fan Zhu, Zheng Zhang , Jie Qin, Yazhou Yao, Ling Shao , Jie Qin, Yazhou Yao, Ling Shao : :
 Attentive Region Embedding Network for Zero-Shot Learning. CVPR 2019: 9384-9393
 [c13]Xiao-Bo Jin, Guo-Sen Xie [c13]Xiao-Bo Jin, Guo-Sen Xie , Kaizhu Huang , Kaizhu Huang , Jianyu Miao, Qiufeng Wang: , Jianyu Miao, Qiufeng Wang:
 Beyond Attributes: High-Order Attribute Features for Zero-Shot Learning. ICCV Workshops 2019: 2953-2962
 [c12]Xiaobo Jin, Yuwen Wang, Wenjun Hong: [c12]Xiaobo Jin, Yuwen Wang, Wenjun Hong:
 Power Spectrum Estimation Method Based on Matlab. ICVISP 2019: 70:1-70:5
- 2018
 [j7]Guo-Sen Xie [j7]Guo-Sen Xie , Xiao-Bo Jin, Xu-Yao Zhang, Shaofei Zang, Chunlei Yang, Zhiheng Wang, Jiexin Pu: , Xiao-Bo Jin, Xu-Yao Zhang, Shaofei Zang, Chunlei Yang, Zhiheng Wang, Jiexin Pu:
 From Class-Specific to Class-Mixture: Cascaded Feature Representations via Restricted Boltzmann Machine Learning. IEEE Access 6: 69393-69406 (2018)
 [j6]Kaizhu Huang [j6]Kaizhu Huang , Rui Zhang, Xiaobo Jin, Amir Hussain , Rui Zhang, Xiaobo Jin, Amir Hussain : :
 Special Issue Editorial: Cognitively-Inspired Computing for Knowledge Discovery. Cogn. Comput. 10(1): 1-2 (2018)
 [j5]Xiao-Bo Jin, Guo-Sen Xie [j5]Xiao-Bo Jin, Guo-Sen Xie , Kaizhu Huang , Kaizhu Huang , Amir Hussain , Amir Hussain : :
 Accelerating Infinite Ensemble of Clustering by Pivot Features. Cogn. Comput. 10(6): 1042-1050 (2018)
 [j4]Xiao-Bo Jin, Guang-Gang Geng [j4]Xiao-Bo Jin, Guang-Gang Geng , Guo-Sen Xie , Guo-Sen Xie , Kaizhu Huang , Kaizhu Huang : :
 Approximately optimizing NDCG using pair-wise loss. Inf. Sci. 453: 50-65 (2018)
 [c11]Xiaobo Jin, Xiaoxiang Wang, Dongyu Wang: [c11]Xiaobo Jin, Xiaoxiang Wang, Dongyu Wang:
 Resource Allocation for Energy Efficiency Maximization of Layered Multicast in SCMA Networks. APCC 2018: 459-464
 [c10]Guang-Gang Geng [c10]Guang-Gang Geng , Zhiwei Yan, Yu Zeng, Xiao-Bo Jin: , Zhiwei Yan, Yu Zeng, Xiao-Bo Jin:
 RRPhish: Anti-phishing via mining brand resources request. ICCE 2018: 1-2
 [i7]Xiao-Bo Jin, Kaizhu Huang, Jianyu Miao: [i7]Xiao-Bo Jin, Kaizhu Huang, Jianyu Miao:
 Beyond Attributes: Adversarial Erasing Embedding Network for Zero-shot Learning. CoRR abs/1811.07626 (2018)
- 2017
 [j3]Guo-Sen Xie [j3]Guo-Sen Xie , Xiao-Bo Jin, Zheng Zhang , Xiao-Bo Jin, Zheng Zhang , Zhonghua Liu, Xiaowei Xue, Jiexin Pu: , Zhonghua Liu, Xiaowei Xue, Jiexin Pu:
 Retargeted Multi-View Feature Learning With Separate and Shared Subspace Uncovering. IEEE Access 5: 24895-24907 (2017)
 [c9]Xi Zhang, Yu Zeng, Xiao-Bo Jin, Zhiwei Yan, Guang-Gang Geng [c9]Xi Zhang, Yu Zeng, Xiao-Bo Jin, Zhiwei Yan, Guang-Gang Geng : :
 Boosting the phishing detection performance by semantic analysis. IEEE BigData 2017: 1063-1070
 [i6]Xiao-Bo Jin, Xu-Yao Zhang, Kaizhu Huang, Guang-Gang Geng: [i6]Xiao-Bo Jin, Xu-Yao Zhang, Kaizhu Huang, Guang-Gang Geng:
 Stochastic Conjugate Gradient Algorithm with Variance Reduction. CoRR abs/1710.09979 (2017)
- 2016
 [c8]Xiao-Bo Jin, Guang-Gang Geng [c8]Xiao-Bo Jin, Guang-Gang Geng , Kaizhu Huang , Kaizhu Huang , Zhiwei Yan: , Zhiwei Yan:
 Statistical Entity Ranking with Domain Knowledge. NLPCC/ICCPOL 2016: 811-818
 [i5]Xiao-Bo Jin, Guang-Gang Geng, Kaizhu Huang, Zhiwei Yan: [i5]Xiao-Bo Jin, Guang-Gang Geng, Kaizhu Huang, Zhiwei Yan:
 Ranking Entity Based on Both of Word Frequency and Word Sematic Features. CoRR abs/1608.01068 (2016)
- 2015
 [j2]Xiao-Bo Jin, Guanggang Geng [j2]Xiao-Bo Jin, Guanggang Geng , Minghe Sun , Minghe Sun , Dexian Zhang: , Dexian Zhang:
 Combination of multiple bipartite ranking for multipartite web content quality evaluation. Neurocomputing 149: 1305-1314 (2015)
- 2013
 [i4]Xiao-Bo Jin, Guanggang Geng: [i4]Xiao-Bo Jin, Guanggang Geng:
 Linear NDCG and Pair-wise Loss. CoRR abs/1303.2417 (2013)
 [i3]Guanggang Geng, Xiao-Bo Jin, Xinchang Zhang, Dexian Zhang: [i3]Guanggang Geng, Xiao-Bo Jin, Xinchang Zhang, Dexian Zhang:
 Evaluating Web Content Quality via Multi-scale Features. CoRR abs/1304.6181 (2013)
 [i2]Xiao-Bo Jin, Qiang Lu, Feng Wang, Quan-gong Huo: [i2]Xiao-Bo Jin, Qiang Lu, Feng Wang, Quan-gong Huo:
 Qualitative detection of oil adulteration with machine learning approaches. CoRR abs/1305.3149 (2013)
 [i1]Xiao-Bo Jin, Guanggang Geng, Dexian Zhang: [i1]Xiao-Bo Jin, Guanggang Geng, Dexian Zhang:
 Combination of Multiple Bipartite Ranking for Web Content Quality Evaluation. CoRR abs/1309.3132 (2013)
- 2012
 [c7]Quan-gong Huo, Xiao-Bo Jin, Hong-mei Zhang: [c7]Quan-gong Huo, Xiao-Bo Jin, Hong-mei Zhang:
 Multi-label classification for Oil Authentication. FSKD 2012: 711-714
 [c6]Xiao-Bo Jin, Junwei Yu, Dexian Zhang, Guanggang Geng [c6]Xiao-Bo Jin, Junwei Yu, Dexian Zhang, Guanggang Geng : :
 Multi-partite ranking with multi-class AdaBoost algorithm. FSKD 2012: 884-887
 [c5]Xiao-Bo Jin, Guanggang Geng, Junwei Yu, Dexian Zhang: [c5]Xiao-Bo Jin, Guanggang Geng, Junwei Yu, Dexian Zhang:
 Multi-label learning vector quantization algorithm. ICPR 2012: 2140-2143
- 2011
 [c4]Dexian Zhang, Xiao-Bo Jin: [c4]Dexian Zhang, Xiao-Bo Jin:
 Build decision tree on support vector machine. FSKD 2011: 997-1001
- 2010
 [j1]Xiaobo Jin, Cheng-Lin Liu, Xinwen Hou: [j1]Xiaobo Jin, Cheng-Lin Liu, Xinwen Hou:
 Regularized margin-based conditional log-likelihood loss for prototype learning. Pattern Recognit. 43(7): 2428-2438 (2010)
 [c3]Xiaobo Jin, Xinwen Hou, Cheng-Lin Liu: [c3]Xiaobo Jin, Xinwen Hou, Cheng-Lin Liu:
 Multi-class AdaBoost with Hypothesis Margin. ICPR 2010: 65-68
2000 – 2009
- 2008
 [c2]Xiaobo Jin, Cheng-Lin Liu, Xinwen Hou: [c2]Xiaobo Jin, Cheng-Lin Liu, Xinwen Hou:
 Prototype learning with margin-based conditional log-likelihood loss. ICPR 2008: 1-4
- 2007
 [c1]Guanggang Geng [c1]Guanggang Geng , Chunheng Wang, Qiudan Li, Lei Xu, Xiao-Bo Jin: , Chunheng Wang, Qiudan Li, Lei Xu, Xiao-Bo Jin:
 Boosting the Performance of Web Spam Detection with Ensemble Under-Sampling Classification. FSKD (4) 2007: 583-587
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-30 01:56 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







