


default search action
Jun Kong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jun Kong 0001
— Jiangnan University, Wuxi, China
- Jun Kong 0002
— Georgia State University, Atlanta, GA, USA
- Jun Kong 0003
— Yunnan University, Kunming, China
- Jun Kong 0004
— Northeast Normal University, Changchun, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j58]Md. Ochiuddin Miah, Jun Kong:
Augmented Reality and Cross-Device Interaction for Seamless Integration of Physical and Digital Scientific Papers. Int. J. Hum. Comput. Interact. 41(11): 7040-7057 (2025) - [j57]Qiang Fu
, Jiajia Liu
, Jiadai Wang
, Jun Kong
:
Toward Throughput Optimization: A Congestion Control Scheme for CAM Delivery via NR Sidelink. IEEE Internet Things J. 12(9): 12206-12218 (2025) - [j56]Qin Yuan
, Jun Kong, Chun Liu
, Yushi Jiang:
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence. Inf. Technol. People 38(2): 787-826 (2025) - [j55]Hui Sun, Guangzhen Yao
, Sandong Zhu, Long Zhang, Hui Xu, Jun Kong:
SOD-YOLOv10: Small Object Detection in Remote Sensing Images Based on YOLOv10. IEEE Geosci. Remote. Sens. Lett. 22: 1-5 (2025) - [j54]Jiangcheng Wang, Yize Li, Xuefeng Tao, Jun Kong:
Frequency domain adaptive framework for visible-infrared person re-identification. Int. J. Mach. Learn. Cybern. 16(4): 2553-2566 (2025) - [c71]Jun Kong, Xinge Ma, Jin Wang, Xuejie Zhang:
Sample-aware Adaptive Structured Pruning for Large Language Models. AAAI 2025: 17938-17946 - 2024
- [j53]Zhenhua Yang
, Jun Kong:
Cue-based two factor authentication. Comput. Secur. 146: 104068 (2024) - [j52]Tongxin Shi
, Roy A. McCann
, Ying Huang, Wei Wang, Jun Kong
:
Malware Detection for Internet of Things Using One-Class Classification. Sensors 24(13): 4122 (2024) - [c70]Qiang Fu, Jiajia Liu, Jiadai Wang, Jun Kong:
Optimizing Throughput for NR V2X Message Delivery with Congestion Control. GLOBECOM 2024: 3805-3810 - 2023
- [j51]Shuqing Liu
, Hankuan Zhang
, Zhenhua Yang
, Jun Kong, Limin Zhang, Chunhai Gao:
UXBIV: An Evaluation Framework for Business Intelligence Visualization. IEEE Access 11: 92391-92415 (2023) - [j50]Jinlan Liu
, Dongpo Xu, Yinghua Lu, Jun Kong, Danilo P. Mandic:
Last-iterate convergence analysis of stochastic momentum methods for neural networks. Neurocomputing 527: 27-35 (2023) - [j49]Zheng Huang, Yi-Na Li, Jun Kong:
Investigating the multimedia pointing techniques in the tabletop-centric cross-device interaction. Multim. Tools Appl. 82(7): 10077-10098 (2023) - [j48]Hui Xu, Junjie Zhang, Hui Sun, Miao Qi
, Jun Kong:
Analyzing students' attention by gaze tracking and object detection in classroom teaching. Data Technol. Appl. 57(5): 643-667 (2023) - [c69]Wordh Ul Hasan, Juan Li, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao:
Honoring Heritage, Managing Health: A Mobile Diabetes Self-Management App for Native Americans with Cultural Sensitivity and Local Factors. ISCC 2023: 1-6 - 2022
- [j47]Jinlan Liu
, Jun Kong, Dongpo Xu
, Miao Qi, Yinghua Lu:
Convergence analysis of AdaBound with relaxed bound functions for non-convex optimization. Neural Networks 145: 300-307 (2022) - [i1]Dongpo Xu
, Jinlan Liu, Yinghua Lu, Jun Kong, Danilo P. Mandic:
Last-iterate convergence analysis of stochastic momentum methods for neural networks. CoRR abs/2205.14811 (2022) - 2021
- [j46]Zhangyu Meng, Jun Kong, Juan Li
:
Utilizing binary code to improve usability of pressure-based authentication. Comput. Secur. 103: 102187 (2021) - [j45]Xin Wang, Tianyi Liang, Juan Li
, Souradip Roy
, Vikram Pandey, Yang Du, Jun Kong:
Artificial Intelligence-Empowered Chatbot for Effective COVID-19 Information Delivery to Older Adults. Int. J. E Health Medical Commun. 12(6): 1-18 (2021) - [j44]Juechen Yang
, Jun Kong, Chunying Zhao:
A Smartphone-Based Cursor Position System in Cross-Device Interaction Using Machine Learning Techniques. Sensors 21(5): 1665 (2021) - 2020
- [j43]Shuqing Liu
, Tianyi Liang, Shuai Shao, Jun Kong:
Evaluating Localized MOOCs: The Role of Culture on Interface Design and User Experience. IEEE Access 8: 107927-107940 (2020) - [j42]Zheng Huang, Jun Kong:
A Toolkit for Prototyping Tabletop-Centric Cross-Device Interaction. Int. J. Hum. Comput. Interact. 36(6): 536-552 (2020) - [j41]Chunying Zhao, Cong Chen, Kang Zhang, Jun Kong:
ViBERT: Visual Behavior Regression Testing. J. Vis. Lang. Sentient Syst. 2020(2): 31-41 (2020)
2010 – 2019
- 2019
- [j40]Zeqiang Fu, Xiaofeng Wang, Jun Kong:
高性能网络安全告警信息的关联分析方法 (High-performance Association Analysis Method for Network Security Alarm Information). 计算机科学 46(5): 116-121 (2019) - [c68]Bikesh Maharjan, Juan Li, Jun Kong, Cui Tao:
Alexa, What Should I Eat? : A Personalized Virtual Nutrition Coach for Native American Diabetes Patients Using Amazon's Smart Speaker Technology. HealthCom 2019: 1-6 - 2018
- [j39]Tuo Zhang, Jun Kong, Ke Jing, Hanbo Chen, Xi Jiang
, Longchuan Li, Lei Guo, Jianfeng Lu
, Xiaoping Hu
, Tianming Liu:
Optimization of macaque brain DMRI connectome by neuron tracing and myelin stain data. Comput. Medical Imaging Graph. 69: 9-20 (2018) - [j38]Xiaoqin Zeng, Yufeng Liu, Zhan Shi, Yingfeng Wang, Yang Zou, Jun Kong, Kang Zhang:
An Edge-based Graph Grammar Formalism and its Support System. J. Vis. Lang. Sentient Syst. 4: 11-19 (2018) - [j37]Yufeng Liu, Kang Zhang, Jun Kong, Yang Zou, Xiaoqin Zeng:
Spatial specification and reasoning using grammars: from theory to application. Spatial Cogn. Comput. 18(4): 315-340 (2018) - [c67]Yufeng Liu, Zhan Shi, Yingfeng Wang, Yang Zou, Jun Kong, Kang Zhang, Xiaoqin Zeng:
An Edge-based Graph Grammar Formalism and its Support System. DMSVIVA 2018: 101-108 - 2017
- [j36]Long Yu
, Zhiyin Wang, Shengwei Tian, Feiyue Ye, Jianli Ding, Jun Kong:
Convolutional Neural Networks for Water Body Extraction from Landsat Imagery. Int. J. Comput. Intell. Appl. 16(1): 1750001:1-1750001:12 (2017) - [j35]Simone A. Ludwig, Jun Kong:
Investigation of different classifiers and channel configurations of a mobile P300-based brain-computer interface. Medical Biol. Eng. Comput. 55(12): 2143-2154 (2017) - [j34]Di Wang, Chunying Zhao, Jun Kong:
The Fusion of an Ultrasonic and Spatially Aware System in a Mobile-Interaction Device. Symmetry 9(8): 137 (2017) - [j33]Jie Li, Zhao Xiao, Jun Kong:
A viewpoint based approach to the visual exploration of trajectory. J. Vis. Lang. Comput. 41: 41-53 (2017) - [j32]Zheng Huang, Jed Limke, Jun Kong:
Investigating one-handed and two-handed inter-device interaction. J. Vis. Lang. Comput. 42: 1-12 (2017) - [c66]Arnaldo Horta, Neil Joshi, Michael J. Pekala, Katia D. Pacheco, Jun Kong, Neil M. Bressler, David E. Freund, Philippe Burlina:
A Hybrid Approach for Incorporating Deep Visual Features and Side Channel Information with Applications to AMD Detection. ICMLA 2017: 716-720 - 2016
- [j31]Amin Roudaki, Jun Kong, Kang Zhang
:
Specification and discovery of web patterns: a graph grammar approach. Inf. Sci. 328: 528-545 (2016) - [j30]Nan Yu, Jun Kong:
User experience with web browsing on small screens: Experimental investigations of mobile-page interface design and homepage design for news websites. Inf. Sci. 330: 427-443 (2016) - [j29]Veera V. S. M. Chintapalli, Wenyuan Tao, Zhao-Peng Meng, Kang Zhang, Jun Kong, Yue Ge:
A Comparative Study of Spreadsheet Applications on Mobile Devices. Mob. Inf. Syst. 2016: 9816152:1-9816152:10 (2016) - [j28]Amin Roudaki, Jun Kong, Shane Reetz:
SmartCamera: a low-cost and intelligent camera management system. Multim. Tools Appl. 75(13): 7831-7854 (2016) - [c65]Sahar Harati, Andrea Crowell, Helen S. Mayberg, Jun Kong, Shamim Nemati:
Discriminating clinical phases of recovery from major depressive disorder using the dynamics of facial expression. EMBC 2016: 2254-2257 - [c64]Juan Li, Jun Kong:
Cell phone-based diabetes self-management and social networking system for American Indians. HealthCom 2016: 1-6 - [c63]Zheng Huang, Jed Limke, Jun Kong:
A Comparative Study on Inter-Device Interaction: One-Handed Interaction VS Two-Handed Interaction. VINCI 2016: 67-74 - 2015
- [j27]Qasem T. Obeidat
, Tom A. Campbell
, Jun Kong:
Introducing the Edges Paradigm: A P300 Brain-Computer Interface for Spelling Written Words. IEEE Trans. Hum. Mach. Syst. 45(6): 727-738 (2015) - [j26]Yanjiao Shi, Yugen Yi
, Hexin Yan, Jiangyan Dai, Ming Zhang, Jun Kong:
Region contrast and supervised locality-preserving projection-based saliency detection. Vis. Comput. 31(9): 1191-1205 (2015) - [j25]Ali Roudaki, Jun Kong, Nan Yu:
A classification of web browsing on mobile devices. J. Vis. Lang. Comput. 26: 82-98 (2015) - [c62]Kai Liao, Bauke de Vries, Jun Kong, Kang Zhang:
Pattern, Cognition and Spatial Information Processing - Representations of the Spatial Layout of Architectural Design with Spatial-Semantic Analytics. CAAD Futures 2015: 547-562 - [c61]Tuo Zhang, Jun Kong, Ke Jing, Hanbo Chen, Xi Jiang
, Longchuan Li, Lei Guo, Jianfeng Lu, Xiaoping Hu
, Tianming Liu:
Multi-scale and Multimodal Fusion of Tract-Tracing, Myelin Stain and DTI-derived Fibers in Macaque Brains. MICCAI (2) 2015: 246-254 - 2014
- [j24]Amin Roudaki, Jun Kong, Gursimran S. Walia, Ali Roudaki:
PhoneLens: A Low-Cost, Spatially Aware, Mobile-Interaction Device. IEEE Trans. Hum. Mach. Syst. 44(3): 301-314 (2014) - [j23]Ali Roudaki
, Jun Kong, Gursimran S. Walia, Zheng Huang:
A framework for bimanual inter-device interactions. J. Vis. Lang. Comput. 25(6): 727-737 (2014) - [j22]Krishna C. Chinthakayala, Chunying Zhao, Jun Kong, Kang Zhang:
A comparative study of three social networking websites. World Wide Web 17(6): 1233-1259 (2014) - [c60]Ali Roudaki, Jun Kong, Gursimran S. Walia:
A Framework for Bimanual Inter-Device Interactions. DMS 2014: 113-120 - 2013
- [j21]Jun Kong, Pei Xin
, Cheng-Ji Shen, Zhi-Yao Song, Ling Li
:
A high-resolution method for the depth-integrated solute transport equation based on an unstructured mesh. Environ. Model. Softw. 40: 109-127 (2013) - [j20]Ankita Kohli, Chunying Zhao, Jun Kong:
Automatic Usability Evaluation of Mobile Web Pages with XML. Int. J. Handheld Comput. Res. 4(3): 19-40 (2013) - [c59]Jun Kong, Kan Zhang, Xuefeng Chen:
Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers. HCI (22) 2013: 38-44 - [c58]Qasem T. Obeidat
, Tom A. Campbell
, Jun Kong:
The zigzag paradigm: a new P300-based brain computer interface. ICMI 2013: 205-212 - 2012
- [j19]Yaswanth Potla, Ramakanth Annadi, Jun Kong, Gursimran S. Walia, Kendall E. Nygard:
Adapting Web Page Tables on Mobile Devices. Int. J. Handheld Comput. Res. 3(1): 1-22 (2012) - [j18]Jun Kong, Omer Barkol, Ruth Bergman, Ayelet Pnueli, Sagi Schein, Kang Zhang, Chunying Zhao:
Web Interface Interpretation Using Graph Grammars. IEEE Trans. Syst. Man Cybern. Part C 42(4): 590-602 (2012) - [j17]Hamed Ahmadi, Jun Kong:
User-centric adaptation of Web information for small screens. J. Vis. Lang. Comput. 23(1): 13-28 (2012) - [c57]Yuhong Jia, Xiaoxi Yu, Jiangyan Dai, Wanjun Hu, Jun Kong, Miao Qi:
A Novel Moving Cast Shadow Detection of Vehicles in Traffic Scene. IScIDE 2012: 115-124 - 2011
- [j16]Xiangjiu Che, Jun Kong, Jiangyan Dai, Zhanheng Gao, Miao Qi:
Content-based Image Hiding Method for Secure Network Biometric Verification. Int. J. Comput. Intell. Syst. 4(4): 596-605 (2011) - [j15]Jun Kong, W. Y. Zhang, Nan Yu, X. J. Xia:
Design of human-centric adaptive multimodal interfaces. Int. J. Hum. Comput. Stud. 69(12): 854-869 (2011) - [c56]Amin Roudaki, Jun Kong:
Graph Grammar Based Web Data Extraction. SEKE 2011: 373-378 - 2010
- [j14]Jun Kong, Dianxiang Xu, Xiaoqin Zeng:
Uml-Based Modeling and Analysis of Security Threats. Int. J. Softw. Eng. Knowl. Eng. 20(6): 875-897 (2010) - [j13]Mei-Ling Shyu, Yu Cao, Ming Li, Jun Kong, Jie Bao:
Guest Editorial. J. Multim. 5(4): 299-301 (2010) - [j12]Miao Qi, Yinghua Lu, Ning Du, Yinan Zhang, Chengxi Wang, Jun Kong:
A novel image hiding approach based on correlation analysis for secure multimodal biometrics. J. Netw. Comput. Appl. 33(3): 247-257 (2010) - [j11]Weiyi Zhang, Jun Kong:
Multi-Constrained QoS Routing for Distraction-free Service in Pervasive Environment. J. Next Gener. Inf. Technol. 1(2): 35-44 (2010) - [j10]Mei-Ling Shyu, Yu Cao, Jun Kong, Ming Li, Mathias Lux, Jie Bao:
Introduction to the special issue on "data semantics for multimedia systems". Multim. Tools Appl. 46(2-3): 147-154 (2010) - [j9]Chunying Zhao, Jun Kong, Kang Zhang:
Program Behavior Discovery and Verification: A Graph Grammar Approach. IEEE Trans. Software Eng. 36(3): 431-448 (2010) - [c55]Zhongxian Qu, Yan Hu, Huihui Sun, Jun Kong:
A Novel User-Specific Palmprint Verification Approach. FCST 2010: 161-165 - [c54]Jun Kong, Weiyi Zhang, Juan Li, Arjun G. Roy:
A Cross-Layer Design for Adaptive Multimodal Interfaces in Pervasive Computing. SEKE 2010: 726-731
2000 – 2009
- 2009
- [j8]Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations. J. Syst. Softw. 82(2): 292-306 (2009) - [c53]Weiyi Zhang, Jun Kong, Kendall E. Nygard, Ming Li:
Adaptive Configuration of Pervasive Computing System with QoS Consideration. CCNC 2009: 1-5 - [c52]Yinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong:
Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity. CIS (2) 2009: 330-334 - [c51]Na Luo, WeiWei Hu, Jin Zhang, Tao Fu, Jun Kong:
Applying Iterative Logistic Regression and Active Learning to Relevance Feedback in Image Retrieval System. NCM 2009: 1277-1282 - [c50]Sathish Pinagapani, Dianxiang Xu, Jun Kong:
A Comparative Study of Access Control Languages. SSIRI 2009: 407-412 - 2008
- [j7]Jun Kong, Fei Zhu, Jim Stalker, David J. Adams:
iMapper: a web application for the automated analysis and mapping of insertional mutagenesis sequence data against Ensembl genomes. Bioinform. 24(24): 2923-2925 (2008) - [j6]Jun Kong, Yinghua Lu, Shuhua Wang, Miao Qi, Hong-Zhi Li:
A two stage neural network-based personal identification system using handprint. Neurocomputing 71(4-6): 641-647 (2008) - [j5]Neil D. Rawlings
, Fraser R. Morton
, Chai Yin Kok, Jun Kong, Alan J. Barrett
:
MEROPS: the peptidase database. Nucleic Acids Res. 36(Database-Issue): 320-325 (2008) - [c49]Hamed Ahmadi, Jun Kong:
Efficient web browsing on small screens. AVI 2008: 23-30 - [c48]Jun Kong, Dianxiang Xu:
A UML-Based Framework for Design and Analysis of Dependable Software. COMPSAC 2008: 28-31 - [c47]Miao Qi, Yinghua Lu, Jinsong Li, Xiaolu Li, Jun Kong:
User-Specific Iris Authentication Based on Feature Selection. CSSE (1) 2008: 1040-1043 - [c46]Yinghua Lu, Yao Fu, Jinsong Li, Xiaolu Li, Jun Kong:
A Multi-modal Authentication Method Based on Human Face and Palmprint. FGCN (2) 2008: 193-196 - [c45]Lei Zhang, Jun Kong, Xiaoyun Zeng, Jiayue Ren:
Plant Species Identification Based on Neural Network. ICNC (5) 2008: 90-94 - [c44]Jun Kong, Kevin L. Ates, Kang Zhang, Yan Gu:
Adaptive Mobile Interfaces through Grammar Induction. ICTAI (1) 2008: 133-140 - [c43]Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang:
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces. ICTAI (2) 2008: 395-402 - [c42]Yan Jin, Miao Qi, Yinghua Lu, Yao Fu, Jun Kong:
Palmprint verification based on genetic algorithm. ISKE 2008: 471-475 - [c41]Xuerong Feng, Chunlei Liu, Jun Kong:
Sorting on Partially Connected Mesh Networks. ITNG 2008: 235-240 - [c40]Jed Limke, Jun Kong, Jing Dong:
Adaptation in a Pervasive Computing Environment. SETP 2008: 145-155 - [p1]Kang Zhang, Jun Kong, Jiannong Cao:
Visual Software Engineering. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j4]Chunying Zhao, Jun Kong, Jing Dong, Kang Zhang:
Pattern-based design evolution using graph transformation. J. Vis. Lang. Comput. 18(4): 378-398 (2007) - [c39]Jun Kong, Ying Zheng, Yinghua Lu, Baoxue Zhang:
A Novel Background Extraction and Updating Algorithm for Vehicle Detection and Tracking. FSKD (3) 2007: 464-468 - [c38]Chunying Zhao, Jun Kong, Kang Zhang:
Design Pattern Evolution and Verification Using Graph Transformation. HICSS 2007: 290 - [c37]Miao Qi, Yinghua Lu, Hong-Zhi Li, Rujuan Wang, Jun Kong:
A Novel Hand-Based Personal Identification Approach. ICANNGA (2) 2007: 309-317 - [c36]Jun Kong, Hong-Zhi Li, Yinghua Lu, Miao Qi, Shuhua Wang:
Hand-Based Personal Identification Using K-Means Clustering and Modified Zernike Moments. ICNC (2) 2007: 651-655 - [c35]Yinghua Lu, Ying Zheng, Xianliang Tong, Yanfen Zhang, Jun Kong:
A Novel Object Tracking Algorithm Based on Discrete Wavelet Transform and Extended Kalman Filter. LSMS (1) 2007: 551-560 - [c34]Jun Kong, Yanfen Zhang, Xiangbo Meng, Ying Zheng, Yinghua Lu:
A Scalable Secret Image Sharing Method Based on Discrete Wavelet Transform. LSMS (1) 2007: 736-745 - 2006
- [j3]Jun Kong, Kang Zhang, Xiaoqin Zeng:
Spatial graph grammars for graphical user interfaces. ACM Trans. Comput. Hum. Interact. 13(2): 268-307 (2006) - [j2]Guang-Lei Song, Jun Kong, Kang Zhang:
AutoGen: Easing model management through two levels of abstraction. J. Vis. Lang. Comput. 17(6): 508-527 (2006) - [c33]Jun Kong, Huijie Xin, Yinghua Lu, Bingbing Li, Yanwen Li:
Vehicle Tracking and Traffic Parameter Extraction Based on Discrete Wavelet Transform. Australian Conference on Artificial Intelligence 2006: 482-490 - [c32]Yinghua Lu, Qiushi Zhao, Jun Kong, Changhua Tang, Yanwen Li:
A Two-Stage Region-Based Image Retrieval Approach Using Combined Color and Texture Features. Australian Conference on Artificial Intelligence 2006: 1010-1014 - [c31]Yinghua Lu, Huijie Xin, Jun Kong, Bingbing Li, Yan Wang:
Shadow Removal Based on Shadow Direction and Shadow Attributes. CIMCA/IAWTIC 2006: 37 - [c30]Jun Kong, Guang-Lei Song, Kang Zhang, Mao Lin Huang
:
A Collaborative Framework for Designers and Developers of Software-Intensive Systems. CSCWD 2006: 306-311 - [c29]Wei Wu, Feng Li, Jun Kong, Lichang Hou, Bingdui Zhu:
A Bottom-Up OCR System for Mathematical Formulas Recognition. ICIC (1) 2006: 274-279 - [c28]Jialing Han, Jun Kong, Yinghua Lu, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks. ICONIP (3) 2006: 225-233 - [c27]Yinghua Lu, Yuru Wang, Jun Kong, Longkui Jiang:
A Novel Automated Hand-Based Personal Identification. IWCIA 2006: 404-414 - [c26]Jun Kong, Miao Qi, Yinghua Lu, Xiaole Liu, Yanjun Zhou:
A Fast and Robust Personal Identification Approach Using Handprint. MRCS 2006: 175-182 - [c25]Yinghua Lu, Jialing Han, Jun Kong, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks. RSCTC 2006: 806-814 - 2005
- [j1]Kang Zhang, Jun Kong, Mei Kang Qiu, Guang-Lei Song:
Multimedia layout adaptation through grammatical specifications. Multim. Syst. 10(3): 245-260 (2005) - [c24]Jun Kong, Xinyue Liu, Yinghua Lu, Xiaofeng Zhou, Qiushi Zhao:
Robust License Plate Segmentation Method Based on Texture Features and Radon Transform. Australian Conference on Artificial Intelligence 2005: 510-519 - [c23]Yinghua Lu, Wei Wang, Jun Kong, Jialing Han, Gang Hou:
Joint Spatial and Frequency Domains Watermarking Algorithm Based on Wavelet Packets. Australian Conference on Artificial Intelligence 2005: 934-937 - [c22]Yinghua Lu, Lijie Yu, Jun Kong, Changhua Tang:
A Novel License Plate Location Method Based on Neural Network and Saturation Information. Australian Conference on Artificial Intelligence 2005: 1037-1040 - [c21]Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong:
Secure Model Management Operations for the Web. DBSec 2005: 237-251 - [c20]Pu Liu, Sheldon X.-D. Tan, Hang Li, Zhenyu Qi, Jun Kong, Bruce McGaughy, Lei He:
An efficient method for terminal reduction of interconnect circuits considering delay variations. ICCAD 2005: 821-826 - [c19]Jun Kong, Kang Zhang, Jing Dong:
Grammar-Specified Model-Driven Architectures. ICECCS 2005: 24-25 - [c18]Kang Zhang, Guang-Lei Song, Jun Kong:
Interoperating XML-style of digital artifacts for information reuse. IRI 2005: 126-131 - [c17]Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song:
A Generative Style-driven Framework for Software Architecture Design. SEW 2005: 173-182 - [c16]Xiaoqin Zeng, Kang Zhang, Jun Kong, Guang-Lei Song:
RGG+: An Enhancement to the Reserved Graph Grammar Formalism. VL/HCC 2005: 272-274 - 2004
- [c15]Jun Kong, Baoxue Zhang, Wanwu Guo:
Analytical Test on Effectiveness of MCDF Operations. International Conference on Computational Science 2004: 388-395 - [c14]Jun Kong, Dongguang Li, Chunnong Zhao:
An Automatic Analysis System for Firearm Identification Based on Ballistics Projectile. Rough Sets and Current Trends in Computing 2004: 653-658 - [c13]Kang Zhang, Guang-Lei Song, Jun Kong:
Rapid Software Prototyping Using Visual Language Techniques. IEEE International Workshop on Rapid System Prototyping 2004: 119-126 - [c12]Guang-Lei Song, Kang Zhang, Jun Kong:
Model Management Through Graph Transformation. VL/HCC 2004: 75-82 - [c11]Jun Kong, Kang Zhang:
Parsing Spatial Graph Grammars. VL/HCC 2004: 99-101 - [c10]Jun Kong, Kang Zhang:
On a Spatial Graph Grammar Formalism. VL/HCC 2004: 102-104 - [c9]Jun Kong:
Browsing Web Through Audio. VL/HCC 2004: 279-280 - [c8]Guang-Lei Song, Kang Zhang, Raymond K. Wong, Jun Kong:
Management of Web Data Models Based on Graph Transformation. Web Intelligence 2004: 398-404 - 2003
- [c7]Jun Kong, Kang Zhang, Mao Lin Huang:
Application-oriented Spatial Graph Grammars. Applied Informatics 2003: 210-215 - [c6]Jun Kong, D. G. Li, A. C. Watson:
A Firearm Identification System Based on Neural Network. Australian Conference on Artificial Intelligence 2003: 315-326 - [c5]Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song:
A Graph Grammar Approach to Software Architecture Verification and Transformation. COMPSAC 2003: 492- - [c4]Jun Kong, Kang Zhang:
Toward a Graphical Approach to Multimedia Document Design. ICDCS Workshops 2003: 666-671 - [c3]Jun Kong, Meikang Qiu, Kang Zhang:
Authoring multimedia documents through grammatical specifications. ICME 2003: 629-632 - [c2]Mei Kang Qiu, Guang-Lei Song, Jun Kong, Kang Zhang:
Spatial graph grammars for web information transformation. HCC 2003: 84-91 - [c1]Jun Kong, Kang Mang:
Graph-based Consistency Checking in Spatial Information System. HCC 2003: 153-160
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-13 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint