default search action
Tingyao Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Tingyao Jiang, Xiaobo Fu, Min Wang:
BBO-CFAT: Network Intrusion Detection Model Based on BBO Algorithm and Hierarchical Transformer. IEEE Access 12: 54191-54201 (2024) - [j17]Yan Chen, Miao Tian, Qirui Wu, Liufeng Tao, Tingyao Jiang, Qinjun Qiu, Hua Huang:
A deep learning-based method for deep information extraction from multimodal data for geological reports to support geological knowledge graph construction. Earth Sci. Informatics 17(3): 1867-1887 (2024) - [j16]Tingyao Jiang, Xuan Hou, Min Wang:
Insulator Defect Detection Based on the CDDCR-YOLOv8 Algorithm. Int. J. Comput. Intell. Syst. 17(1): 245 (2024) - [c8]Yadong Lu, Huan Zhou, Hengtao Wang, Tingyao Jiang, Victor C. M. Leung:
Online Trajectory Optimization and Resource Allocation in UAV-Assisted NOMA-MEC Systems. IWQoS 2024: 1-2 - 2023
- [j15]Tingyao Jiang, Zilong Wang, Ming Yang, Cheng Li:
Aspect-Based Sentiment Analysis with Dependency Relation Weighted Graph Attention. Inf. 14(3): 185 (2023) - [j14]Tingyao Jiang, Wei Sun, Min Wang:
MSGAT-Based Sentiment Analysis for E-Commerce. Inf. 14(7): 416 (2023) - [c7]Jianmeng Guo, Huan Zhou, Liang Zhao, Wei Chang, Tingyao Jiang:
Incentive-driven and SAC-based Resource Allocation and Offloading Strategy in Vehicular Edge Computing Networks. INFOCOM Workshops 2023: 1-6 - 2022
- [j13]Xiaolu Hu, Tingyao Jiang, Min Wang:
A Hybrid Recommendation Model for Online Learning. Int. J. Robotics Autom. 37(5) (2022) - 2020
- [j12]Yaobin Zou, Jinyu Zhang, Manish Upadhyay, Shuifa Sun, Tingyao Jiang:
Automatic Image Thresholding Based on Shannon Entropy Difference and Dynamic Synergic Entropy. IEEE Access 8: 171218-171239 (2020)
2010 – 2019
- 2017
- [j11]Linping Tong, Shouzhi Xu, Huan Zhou, Tingyao Jiang:
复杂网络中节点暂态中心性预测研究 (Research on Temporal Centrality Prediction of Nodes in Complex Networks). 计算机科学 44(10): 122-126 (2017) - [j10]Huan Zhou, Linping Tong, Tingyao Jiang, Shouzhi Xu, Jialu Fan, Ke Lv:
Maximum data delivery probability-oriented routing protocol in opportunistic mobile networks. Peer-to-Peer Netw. Appl. 10(3): 500-509 (2017) - 2016
- [j9]Tingyao Jiang, Peng Lei, Qin Qin:
An Application of SVM-Based Classification in Landslide Stability. Intell. Autom. Soft Comput. 22(2): 267-271 (2016) - 2014
- [j8]Yaobin Zou, Fangmin Dong, Bangjun Lei, Shuifa Sun, Tingyao Jiang, Peng Chen:
Maximum similarity thresholding. Digit. Signal Process. 28: 120-135 (2014) - [j7]Tingyao Jiang, Zhonghu Jing, Jihua Wang:
Sensitivity Analysis of Transport Machinery Configuration in Underground Cavern Group Construction. Intell. Autom. Soft Comput. 20(4): 525-534 (2014) - [c6]Yaobin Zou, Lulu Fang, Fangmin Dong, Bangjun Lei, Shuifa Sun, Tingyao Jiang, Peng Chen:
Median-based thresholding, minimum error thresholding, and their relationships with histogram-based image similarity. ICDIP 2014: 915915 - 2013
- [j6]Bencan Gong, Tingyao Jiang, Shouzhi Xu, Peng Chen:
An Energy-Heterogeneous Clustering Scheme to Avoid Energy Holes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j5]Xiaohui Chen, Jing He, Bangjun Lei, Tingyao Jiang:
An Improved Localization Algorithm of Nodes in Wireless Sensor Network. J. Networks 7(1): 110-115 (2012) - 2011
- [j4]Tingyao Jiang, Dong Ren, Simon X. Yang:
A Special Issue of Intelligent Automation and Soft Computing - Theoretical Investigation Of Dependable Computing. Intell. Autom. Soft Comput. 17(5): 493-495 (2011) - [j3]Tingyao Jiang, Xiao Chen, Dewei Shu:
An Improved Integrated Tender Evaluation Method Based On Analytic Hierarchy Process. Intell. Autom. Soft Comput. 17(5): 651-658 (2011) - [j2]Dong Ren, Tingyao Jiang, Simon X. Yang:
A Special Issue of Intelligent Automation and Soft Computing - Applications of Dependable Computing. Intell. Autom. Soft Comput. 17(6): 661-663 (2011) - [j1]Tingyao Jiang, Heng Yu, Lele Cui:
A Novel Security Mechanism for Hybrid Encryption in Mineral Management Information System. Intell. Autom. Soft Comput. 17(6): 665-674 (2011)
2000 – 2009
- 2007
- [c5]Shouzhi Xu, Tingyao Jiang, Alin Zhong, Wangmin Yang, Lili Zhang, Qiaoli Liu:
A-ary Tree-based Minimum Exact Cover of Leaf Set for Secure Group Communication in Grids. GCC 2007: 11-18 - 2004
- [c4]Youlin Ruan, Gan Liu, Qinghua Li, Tingyao Jiang:
An Efficient Scheduling Algorithm for Dependent Tasks. CIT 2004: 456-461 - [c3]Tingyao Jiang, Qinghua Li:
A Self-Stabilizing Distributed Multicast Algorithm for Mobile Ad-Hoc Networks. CIT 2004: 499-502 - [c2]Tingyao Jiang, Qinghua Li, Youlin Ruan:
Secure Dynamic Source Routing Protocol. CIT 2004: 528-533 - 2003
- [c1]Tingyao Jiang, Aling Zhong:
A Multicast Routing Algorithm for P2P Networks. GCC (1) 2003: 452-455
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint