default search action
Jie Ling 0002
Person information
- affiliation: Guangdong University of Technology, School of Computer Science, China
Other persons with the same name
- Jie Ling — disambiguation page
- Jie Ling 0001 — Wuhan University, Hubei Key Laboratory of Waterjet Theory and New Technology, China
- Jie Ling 0003 — Nanjing University of Posts and Telecommunications, Institute of Signal Processing and Transmission, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Jie Ling, Junchang Zheng, Jiahui Chen:
Efficient federated learning privacy preservation method with heterogeneous differential privacy. Comput. Secur. 139: 103715 (2024) - [j29]Yu Luo, Shaowei Zhang, Jie Ling, Zhiyi Lin, Zongming Wang, Shun Yao:
Mask-guided generative adversarial network for MRI-based CT synthesis. Knowl. Based Syst. 295: 111799 (2024) - [j28]Yu Luo, Bijia You, Guanghui Yue, Jie Ling:
Pseudo-Supervised Low-Light Image Enhancement With Mutual Learning. IEEE Trans. Circuits Syst. Video Technol. 34(1): 85-96 (2024) - [j27]Limin Zheng, Yu Luo, Zihan Zhou, Jie Ling, Guanghui Yue:
CDINet: Content Distortion Interaction Network for Blind Image Quality Assessment. IEEE Trans. Multim. 26: 7089-7100 (2024) - [i1]Yue Cai, Yu Luo, Jie Ling, Shun Yao:
Joint Edge Optimization Deep Unfolding Network for Accelerated MRI Reconstruction. CoRR abs/2405.05564 (2024) - 2023
- [j26]Jie Ling, Xiaohuan Chen, Yu Luo:
Improving the transferability of adversarial samples with channel switching. Appl. Intell. 53(24): 30580-30592 (2023) - [j25]Yu Luo, Qingdong Huang, Jie Ling, Kailong Lin, Teng Zhou:
Local and global knowledge distillation with direction-enhanced contrastive learning for single-image deraining. Knowl. Based Syst. 268: 110480 (2023) - [j24]Guosheng Gu, Huihong Lu, Jiehang Deng, Hao Wang, Haomin Wei, Jie Ling:
A synergetic image encryption method based on discrete fractional random transform and chaotic maps. Multim. Tools Appl. 82(14): 22123-22147 (2023) - [j23]Yu Luo, Manting Wei, Si Li, Jie Ling, Guobo Xie, Shun Yao:
An Effective Co-Support Guided Analysis Model for Multi-Contrast MRI Reconstruction. IEEE J. Biomed. Health Informatics 27(5): 2477-2488 (2023) - [j22]Kailong Lin, Shaowei Zhang, Yu Luo, Jie Ling:
Unrolling Rain-guided Detail Recovery Network for Single Image Deraining. Virtual Real. Intell. Hardw. 5(1): 11-23 (2023) - [c8]Jiaming Xie, Yu Luo, Jie Ling, Guanghui Yue:
No Reference Image Quality Assessment Via Quality Difference Learning. ICME 2023: 1301-1306 - [c7]Qi Li, Xiaoling Wu, Zhixiong Cao, Jie Ling:
Anomaly Detection of IoT traffic Based on LSTM and Attention Mechanism. ICMLC 2023: 457-463 - [c6]Jingpei Chen, Xiaoling Wu, Jie Ling, Hoon Heo:
Research on Multi-level Location Privacy Protection for Mobile Crowd Sensing based on Blockchain. ICMLC 2023: 469-475 - 2022
- [j21]Tianrong Chen, Jie Ling, Yuping Sun:
White-box content camouflage attacks against deep learning. Comput. Secur. 117: 102676 (2022) - [j20]Yu Luo, Menghua Wu, Qingdong Huang, Jian Zhu, Jie Ling, Bin Sheng:
Joint feedback and recurrent deraining network with ensemble learning. Vis. Comput. 38(9): 3109-3119 (2022) - [c5]Wei Wang, Yu Luo, Jie Ling, Youyi Song, Teng Zhou:
C3Net: A Cross-Channel Cross-Scale and Cross-Stage Network for Single Image Super-Resolution. ICME 2022: 1-6 - 2021
- [j19]Jie Ling, Zhishen Zhu, Yu Luo, Hao Wang:
An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit. Comput. Electr. Eng. 91: 107049 (2021) - [j18]Jian Zhu, Peiyu Liu, Yu Luo, Jie Ling, Enhua Wu:
A new two-stage method for single image rain removal. IET Image Process. 15(2): 492-503 (2021) - [j17]Jie Ling, Su Xiong, Yu Luo:
Semi-supervised learning approach for malicious URL detection via adversarial learning. J. Intell. Fuzzy Syst. 41(2): 3083-3092 (2021) - [j16]Jie Ling, Junwei Chen, Jiahui Chen, Wensheng Gan:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. Secur. Commun. Networks 2021: 6661450:1-6661450:13 (2021) - 2020
- [j15]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j14]Yu Luo, Jie Ling:
Single-image de-raining using low-rank matrix approximation. Neural Comput. Appl. 32(11): 7503-7514 (2020) - [j13]Jiahui Chen, Jianting Ning, Jie Ling, Terry Shue Chien Lau, Yacheng Wang:
A new encryption scheme for multivariate quadratic systems. Theor. Comput. Sci. 809: 372-383 (2020)
2010 – 2019
- 2019
- [j12]Xiaoling Wu, Junjie Huang, Jie Ling, Lei Shu:
BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks. IEEE Access 7: 43679-43690 (2019) - [j11]Fenghuan Li, Kehai Chen, Jie Ling, Yinwei Zhan, Gunasekaran Manogaran:
Automatic diagnosis of cardiac arrhythmia in electrocardiograms via multigranulation computing. Appl. Soft Comput. 80: 400-413 (2019) - [j10]Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - [j9]Abdulraqeb Abdullah Saeed Abdo, Jie Ling, Pinghua Chen:
A low-loss high-linearity SOI SP6T antenna switch using diode biasing method. IEICE Electron. Express 16(18): 20190494 (2019) - [j8]Dan Gao, Jie Ling, Jiahui Chen:
基于可撤销外包属性加密的二维码加密 (Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption). 计算机科学 46(12): 186-191 (2019) - [c4]Abdulraqeb Abdullah Saeed Abdo, Jie Ling, Pinghua Chen:
Architecture considerations of LTE/WCDMA wideband power amplifier for efficiency improvement. ASICON 2019: 1-4 - [c3]Jiahui Chen, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan:
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature. Inscrypt 2019: 443-451 - 2018
- [j7]Yu Luo, Jian Zhu, Jie Ling, Enhua Wu:
Fast Removal of Rain Streaks From a Single Image via a Shape Prior. IEEE Access 6: 60069-60078 (2018) - [j6]Yi Liu, Yinghui Zhang, Jie Ling, Zhusong Liu:
Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener. Comput. Syst. 78: 1020-1026 (2018) - [j5]Yi Liu, Hao Wang, Tong Li, Ping Li, Jie Ling:
Attribute-based handshake protocol for mobile healthcare social networks. Future Gener. Comput. Syst. 86: 873-880 (2018) - [j4]Zhaofeng Su, Lvzhou Li, Jie Ling:
An approach for quantitatively analyzing the genuine tripartite nonlocality of general three-qubit states. Quantum Inf. Process. 17(4): 85 (2018) - [j3]Yi Liu, Jie Ling, Zhusong Liu, Jian Shen, Chongzhi Gao:
Finger vein secure biometric template generation based on deep learning. Soft Comput. 22(7): 2257-2265 (2018) - 2016
- [j2]Yi Liu, Jie Ling, Qianhong Wu, Bo Qin:
Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks. Soft Comput. 20(8): 3335-3346 (2016) - [j1]Guosheng Gu, Jie Ling, Guobo Xie, Zheng Li:
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images. Signal Process. Image Commun. 40: 52-64 (2016)
2000 – 2009
- 2007
- [c2]Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu:
Certified Email Delivery with Offline TTP. IAS 2007: 15-20 - [c1]Hao Wang, Yuyi Ou, Jie Ling, Xiang Xu, Heqing Guo:
A New Certified Email Protocol. DEXA Workshops 2007: 683-687
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint