default search action
Ke Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Xiaoyang Yu, Lei Liang, Ke Jiang, Tianwei Chen, Shangming Du:
Low Complexity Encoding Design for Fiber Optic Measurement While Drilling Communication System Based on Superposition Spinal Codes. IEEE Access 12: 155598-155606 (2024) - [j52]Rui Shi, Shan Gao, Huichao Huang, Ke Jiang, Dongsheng Wang:
Integrating network pharmacology with microRNA microarray analysis to identify the role of miRNAs in thrombosis treated by the Dahuang Zhechong pill. Comput. Biol. Medicine 173: 108338 (2024) - [j51]Lujie Zhong, Shujie Yang, Kefei Song, Mu Wang, Ke Jiang, Gabriel-Miro Muntean:
MDC2: An Integrated Communication and Computing Framework to Optimize Edge-Assisted Caching for Improved Multimedia Services in UAV-Based IoT Networks. IEEE Internet Things J. 11(20): 32393-32403 (2024) - [j50]Baoshun Shi, Ke Jiang, Shaolei Zhang, Qiusheng Lian, Yanwei Qin, Yunsong Zhao:
Mud-Net: multi-domain deep unrolling network for simultaneous sparse-view and metal artifact reduction in computed tomography. Mach. Learn. Sci. Technol. 5(1): 15010 (2024) - [j49]Baoshun Shi, Shaolei Zhang, Ke Jiang, Qiusheng Lian:
Coupling Model- and Data-Driven Networks for CT Metal Artifact Reduction. IEEE Trans. Computational Imaging 10: 415-428 (2024) - [j48]Zhaohui Jiang, Ke Jiang, Yongfang Xie, Dong Pan, Weihua Gui:
A Cooperative Silicon Content Dynamic Prediction Method With Variable Time Delay Estimation in the Blast Furnace Ironmaking Process. IEEE Trans. Ind. Informatics 20(1): 626-637 (2024) - [j47]Ke Jiang, Zhaohui Jiang, Xudong Jiang, Yongfang Xie, Weihua Gui:
Reinforcement Learning for Blast Furnace Ironmaking Operation With Safety and Partial Observation Considerations. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3077-3090 (2024) - [c45]Feihong Lu, Xiaocui Yang, Qian Li, Qingyun Sun, Ke Jiang, Cheng Ji, Jianxin Li:
Few-Shot Multimodal Named Entity Recognition Based on Mutlimodal Causal Intervention Graph. LREC/COLING 2024: 7208-7219 - [c44]Lingyu Qiu, Ke Jiang, Sinan Liu, Xiaoyang Tan:
Multi-level Distributional Discrepancy Enhancement for Cross Domain Face Forgery Detection. PRCV (15) 2024: 508-522 - [c43]Ke Jiang, Ping Yang, Yue Xiao, Peng Li, Tony Q. S. Quek:
A Novel Optimized Affine Frequency Division Multiplexing Design for Future High-mobility Communications. WCNC 2024: 1-6 - 2023
- [j46]Ke Jiang, Leilei Zhang, Xiaojuan Zhang, Yusheng Wang:
Sustainable implementation of the carbon-labeling policy with customer participation and government supervision. Comput. Ind. Eng. 178: 109100 (2023) - [j45]Jingkun Wang, Haotian Sun, Ke Jiang, Weiwei Cao, Shuangqing Chen, Jianbing Zhu, Xiaodong Yang, Jian Zheng:
CAPNet: Context attention pyramid network for computer-aided detection of microcalcification clusters in digital breast tomosynthesis. Comput. Methods Programs Biomed. 242: 107831 (2023) - [j44]Jinlian Liu, Xinyao Zhou, Hanya Tang, Fengqin Yan, Shiwei Liu, Xuguang Tang, Zhi Ding, Ke Jiang, Pujia Yu:
Feedback and contribution of vegetation, air temperature and precipitation to land surface temperature in the Yangtze River Basin considering statistical analysis. Int. J. Digit. Earth 16(1): 2941-2961 (2023) - [j43]Ke Jiang, Qian Xu:
Analyzing the dynamics of social media texts using coherency network analysis: a case study of the tweets with the co-hashtags of #BlackLivesMatter and #StopAsianHate. Frontiers Res. Metrics Anal. 8 (2023) - [j42]Yubo Li, Jiadong He, Cangcang Fu, Ke Jiang, Junjie Cao, Bing Wei, Xiaozhi Wang, Jikui Luo, Weize Xu, Jihua Zhu:
Children's Pain Identification Based on Skin Potential Signal. Sensors 23(15): 6815 (2023) - [j41]Ke Jiang, Lei Liang, Xiaoling Tong, Feiyu Zeng, Xiaolong Hu:
How the Material Characteristics of Optical Fibers and Soil Influence the Measurement Results of Distributed Acoustic Sensing. Sensors 23(17): 7340 (2023) - [j40]Wei Jiang, Xinke Liao, Jinyu Zhan, Deepak Adhikari, Ke Jiang:
DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems. IEEE Trans. Computers 72(6): 1652-1665 (2023) - [j39]Kanglin Ning, Yanfei Liu, Yanzhao Su, Ke Jiang:
Point-Voxel and Bird-Eye-View Representation Aggregation Network for Single Stage 3D Object Detection. IEEE Trans. Intell. Transp. Syst. 24(3): 3223-3235 (2023) - [j38]Xingyan Chen, Mu Wang, Changqiao Xu, Yu Zhao, Shujie Yang, Ke Jiang, Qing Li, Lujie Zhong, Gabriel-Miro Muntean:
FedLive: A Federated Transmission Framework for Panoramic Livecast With Reinforced Variational Inference. IEEE Trans. Multim. 25: 8471-8486 (2023) - [j37]Ke Jiang, Ping Yang, Marco Di Renzo, Yue Xiao, Shaoqian Li, Wei Xiang:
Beam Direction-Based Modulation for Millimeter-Wave Communication Systems: Design and Optimization. IEEE Trans. Veh. Technol. 72(3): 3392-3403 (2023) - [j36]Jinyu Zhan, Yongjia Yang, Wei Jiang, Ke Jiang, Zhiguo Shi, Cheng Zhuo:
Fast Multi-Lane Detection Based on CNN Differentiation for ADAS/AD. IEEE Trans. Veh. Technol. 72(12): 15290-15300 (2023) - [c42]Junfeng Wang, Ting Shi, Maoding Liu, Ke Jiang:
Knowledge Graph Based Augmented Reality Work Instruction for Wire Harness Final Assembly on Formboard. CASE 2023: 1-6 - [c41]Ke Jiang, Zirui Wang, Runze Shen, Sibo Wang, Yang Liu, Yizhuo Feng, Xiaohe Lisun, Zhenfeng Li:
A Neurological Recovery Prediction Algorithm Based on Multi-Feature Extraction and Bagging Aggregation. CinC 2023: 1-4 - [c40]Hongjing Li, Zan Zhou, Haochen Zhang, Ke Jiang:
Cohort-based Federated Learning Credit Evaluation Method in the Metaverse. HP3C 2023: 1-7 - [c39]Ke Jiang, Jialu Hu, Chuxing Fang, Hongjing Li:
Adaptive Anti-jitter Optimization for Immersive Streaming in Metaverse Scenarios. HP3C 2023: 310-319 - [c38]Ke Jiang, Jia-Yu Yao, Xiaoyang Tan:
Recovering from Out-of-sample States via Inverse Dynamics in Offline Reinforcement Learning. NeurIPS 2023 - [c37]Jingyu Zhang, Ke Jiang, Suhan Wang, Shijie Ming, Huidi Wang:
Forestlight: A Virtual Reality Respiratory Biofeedback System Using Interactive Lighting for Pressure Relief. SUI 2023: 64:1-64:5 - 2022
- [j35]Shujie Yang, Jialu Hu, Ke Jiang, Han Xiao, Mu Wang:
Hybrid-360: An adaptive bitrate algorithm for tile-based 360 video streaming. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j34]Ke Jiang, Ping Yang, Bo Zhang, Zi Long Liu, Jialiang Fu, Shaoqian Li:
A Novel Extreme-Learning-Machine Aided Receiver Design for THz-SM With Hardware Imperfections. IEEE Commun. Lett. 26(11): 2606-2610 (2022) - [j33]Yingquan Wang, Ke Jiang, Hu Lu, Ziheng Xu, Gaojian Li, Chao Chen, Xia Geng:
Encoder-decoder assisted image generation for person re-identification. Multim. Tools Appl. 81(7): 10373-10390 (2022) - [j32]Hu Lu, Chao Chen, Hui Wei, Zhongchen Ma, Ke Jiang, Yingquan Wang:
Improved deep convolutional embedded clustering with re-selectable sample training. Pattern Recognit. 127: 108611 (2022) - [j31]Ke Jiang, Zhaohui Jiang, Yongfang Xie, Dong Pan, Weihua Gui:
Abnormality Monitoring in the Blast Furnace Ironmaking Process Based on Stacked Dynamic Target-Driven Denoising Autoencoders. IEEE Trans. Ind. Informatics 18(3): 1854-1863 (2022) - [j30]Ke Jiang, Zhaohui Jiang, Yongfang Xie, Dong Pan, Weihua Gui:
Prediction of Multiple Molten Iron Quality Indices in the Blast Furnace Ironmaking Process Based on Attention-Wise Deep Transfer Network. IEEE Trans. Instrum. Meas. 71: 1-14 (2022) - [j29]Ke Jiang, Ping Yang, Yue Xiao, Zilong Liu, Yong Liang Guan, Marco Di Renzo:
Power Allocation-Aided Enhanced SM-OFDM: Closed-Form Solutions and Experimental Results. IEEE Trans. Veh. Technol. 71(2): 2146-2151 (2022) - [c36]Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang:
Cache Refinement Type for Side-Channel Detection of Cryptographic Software. CCS 2022: 1583-1597 - [c35]Ke Jiang, Tianwei Zhang, David Sanán, Yongwang Zhao, Yang Liu:
A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures. ICFEM 2022: 190-208 - [c34]Baoshun Shi, Yating Gao, Ke Jiang, Qiusheng Lian:
Convolutional Sparse Coding with Weighted L1 Norm for Phase Retrieval: Algorithm and Its Deep Unfolded Network. ICIP 2022: 1746-1750 - [c33]Yuan Zhou, Xiaodong Yue, Yufei Chen, Chao Ma, Ke Jiang:
Convolutional Redistribution Network for Multi-view Medical Image Diagnosis. CLIP@MICCAI 2022: 54-61 - [i5]Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang:
Cache Refinement Type for Side-Channel Detection of Cryptographic Software. CoRR abs/2209.04610 (2022) - [i4]Baoshun Shi, Ke Jiang, Shaolei Zhang, Qiusheng Lian, Yanwei Qin:
TriDoNet: A Triple Domain Model-driven Network for CT Metal Artifact Reduction. CoRR abs/2211.07190 (2022) - 2021
- [j28]Shuhao Chen, Ke Jiang, Haoji Hu, Haoze Kuang, Jianyi Yang, Jikui Luo, Xinhua Chen, Yubo Li:
Emotion Recognition Based on Skin Potential Signals with a Portable Wireless Device. Sensors 21(3): 1018 (2021) - [j27]Zichuang Li, Lei Liang, Hui Wang, Shu Dai, Ke Jiang, Zhiyuan Song:
A Medium-Frequency Fiber Bragg Grating Accelerometer Based on Flexible Hinges. Sensors 21(21): 6968 (2021) - [j26]Liangxin Qian, Ping Yang, Yong Liang Guan, Zi Long Liu, Yue Xiao, Ke Jiang, Ming Xiao:
Multi-Dimensional Polarized Modulation for Land Mobile Satellite Communications. IEEE Trans. Cogn. Commun. Netw. 7(2): 383-397 (2021) - [j25]Dong Pan, Zhaohui Jiang, Weihua Gui, Ke Jiang, Xavier Maldague:
Compensation Method for the Influence of Dust in Optical Path on Infrared Temperature Measurement. IEEE Trans. Instrum. Meas. 70: 1-11 (2021) - [j24]Jian Zheng, Haotian Sun, Shandong Wu, Ke Jiang, Yunsong Peng, Xiaodong Yang, Fan Zhang, Ming Li:
3D Context-Aware Convolutional Neural Network for False Positive Reduction in Clustered Microcalcifications Detection. IEEE J. Biomed. Health Informatics 25(3): 764-773 (2021) - [c32]Xianghang Bu, Yongxing Ca, Chuang Deng, Chi Wu, Ke Jiang:
Integrated Space-Air-Ground Early Detection Technologies and Applicationfor Potential Landslide of Transmission Line Corridor. EBIMCS 2021: 513-519 - [c31]Ke Jiang, Qian Xu:
Building Images of "President Trump": Comparing Co-evolutions of the Trade War Discourse between Influencers and Regular Users on Twitter. HICSS 2021: 1-10 - [c30]Wei Jiang, Xinke Liao, Jinyu Zhan, Ke Jiang:
Work-in-Progress: Improving Resilience of Distributed Real-Time Applications via Security and Fault Tolerance Co-Design. RTSS 2021: 536-539 - [c29]Ke Jiang, Ping Yang, Gang Wu:
Enhanced Space-Domain Index Modulation Based mmWave Communication For Industrial Control. UCET 2021: 37-41 - 2020
- [j23]Wei Fang, TianXiao Jiang, Ke Jiang, Feihong Zhang, Yewen Ding, Jack Sheng:
A method of automatic text summarisation based on long short-term memory. Int. J. Comput. Sci. Eng. 22(1): 39-49 (2020) - [j22]Ke Jiang, Zhaohui Jiang, Yongfang Xie, Zhipeng Chen, Dong Pan, Weihua Gui:
Classification of silicon content variation trend based on fusion of multilevel features in blast furnace ironmaking. Inf. Sci. 521: 32-45 (2020) - [j21]Wei Jiang, Liang Wen, Jinyu Zhan, Ke Jiang:
Design optimization of confidentiality-critical cyber physical systems with fault detection. J. Syst. Archit. 107: 101739 (2020) - [j20]Wei Jiang, Ziwei Song, Jinyu Zhan, Zhiyuan He, Xiangyu Wen, Ke Jiang:
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications. J. Syst. Archit. 110: 101775 (2020) - [j19]Dong Pan, Zhaohui Jiang, Zhipeng Chen, Ke Jiang, Weihua Gui:
Compensation Method for Molten Iron Temperature Measurement Based on Heterogeneous Features of Infrared Thermal Images. IEEE Trans. Ind. Informatics 16(11): 7056-7066 (2020) - [j18]Ke Jiang, Zilong Liu, Ping Yang, Yue Xiao, Shaoqian Li:
An Experimental Investigation of Enhanced SM-OFDM Over Indoor Rician Multipath Channels. IEEE Trans. Veh. Technol. 69(2): 2291-2295 (2020) - [c28]Chenjie Dong, Yizhou Jiang, Ke Jiang, Yumei Huang, Yajie Qin:
A 37.37μW-Per-Cell Multifunctional Automated Nanopore Sequencing CMOS Platform with 16∗8 Biosensor Array. ISCAS 2020: 1-4
2010 – 2019
- 2019
- [j17]Zhigao Cui, Ke Jiang, Tao Wang:
Unsupervised Moving Object Segmentation from Stationary or Moving Camera based on Multi-frame Homography Constraints. Sensors 19(19): 4344 (2019) - [j16]Wei Jiang, Xiong Pan, Ke Jiang, Liang Wen, Qi Dong:
Energy-Aware Design of Stochastic Applications With Statistical Deadline and Reliability Guarantees. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(8): 1413-1426 (2019) - [c27]Ke Jiang, David Sanán, Yongwang Zhao, Shuanglong Kan, Yang Liu:
A Formally Verified Buddy Memory Allocation Model. ICECCS 2019: 144-153 - [c26]Yanzhao Su, Zhigao Cui, Aihua Li, Tao Wang, Ke Jiang:
Dark Channel Prior Guided Conditional Generative Adversarial Network for Single Image Dehazing. PRCV (2) 2019: 761-771 - [i3]Sudipto Mukherjee, Ke Jiang:
A Content-Based Approach to Email Triage Action Prediction: Exploration and Evaluation. CoRR abs/1905.01991 (2019) - 2018
- [j15]Jinyu Zhan, Xia Zhang, Wei Jiang, Yue Ma, Ke Jiang:
Energy optimization of security-sensitive mixed-criticality applications for distributed real-time systems. J. Parallel Distributed Comput. 117: 115-126 (2018) - [j14]Guanglan Zhang, Qiuhui Yang, Xuemei Cheng, Ke Jiang, Shuai Wang, Wukun Tan:
序列模式挖掘在通信网络告警预测中的应用 (Application of Sequence Pattern Mining in Communication Network Alarm Prediction). 计算机科学 45(11A): 535-538 (2018) - [c25]Wei Jiang, Liugen Xiu, Jinyu Zhan, Ke Jiang:
Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress. CODES+ISSS 2018: 9 - [c24]Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang:
Design of security-critical distributed real-time applications with fault-tolerant constraint: work-in-progress. EMSOFT 2018: 4 - 2017
- [j13]George A. Barnett, Weiai Wayne Xu, Jianxun Chu, Ke Jiang, Catherine Huh, Ji-Young Park, Han Woo Park:
Measuring international relations in social media conversations. Gov. Inf. Q. 34(1): 37-44 (2017) - [j12]Wei Jiang, Xia Zhang, Jinyu Zhan, Yue Ma, Ke Jiang:
Design optimization of secure message communication for energy-constrained distributed real-time systems. J. Parallel Distributed Comput. 100: 1-15 (2017) - [j11]Wei Jiang, Paul Pop, Ke Jiang:
Design optimization for security- and safety-critical distributed real-time applications. Microprocess. Microsystems 52: 401-415 (2017) - [c23]Ke Jiang, Suvrit Sra, Brian Kulis:
Combinatorial Topic Models using Small-Variance Asymptotics. AISTATS 2017: 421-429 - [c22]Ke Jiang, Grace A. Benefield, Junfei Yang, George A. Barnett:
Mapping Articles on China in Wikipedia: An Inter-Language Semantic Network Analysis. HICSS 2017: 1-10 - 2016
- [j10]Wei Jiang, Liang Wen, Ke Jiang, Xia Zhang, Xiong Pan, Keran Zhou:
System-Level Design to Detect Fault Injection Attacks on Embedded Real-Time Applications. ACM J. Emerg. Technol. Comput. Syst. 13(2): 22:1-22:18 (2016) - [j9]George A. Barnett, Ke Jiang:
Resilience of the World Wide Web: a longitudinal two-mode network analysis. Soc. Netw. Anal. Min. 6(1): 105:1-105:15 (2016) - [j8]Ke Jiang, Petru Eles, Zebo Peng:
Power-Aware Design Techniques of Secure Multimode Embedded Systems. ACM Trans. Embed. Comput. Syst. 15(1): 6:1-6:29 (2016) - [c21]Xiong Pan, Wei Jiang, Ke Jiang, Liang Wen, Qi Dong:
Energy optimization of stochastic applications with statistical guarantees of deadline and reliability. ASP-DAC 2016: 324-329 - [c20]Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, Lejla Batina:
SPARTA: A scheduling policy for thwarting differential power analysis attacks. ASP-DAC 2016: 667-672 - [i2]Ke Jiang, Suvrit Sra, Brian Kulis:
Combinatorial Topic Models using Small-Variance Asymptotics. CoRR abs/1604.02027 (2016) - 2015
- [b1]Ke Jiang:
Security-Driven Design of Real-Time Embedded Systems. Linköping University, Sweden, 2015 - [j7]Zhigao Cui, Aihua Li, Guoyan Feng, Ke Jiang:
Cooperative object tracking using dual-pan-tilt-zoom cameras based on planar ground assumption. IET Comput. Vis. 9(1): 149-161 (2015) - [j6]Wei Jiang, Ke Jiang, Xia Zhang, Yue Ma:
Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection. J. Syst. Archit. 61(7): 282-292 (2015) - [j5]George A. Barnett, Ke Jiang, Jesse R. Hammond:
Using coherencies to examine network evolution and co-evolution. Soc. Netw. Anal. Min. 5(1): 53:1-53:11 (2015) - [c19]Ke Jiang, Qichao Que, Brian Kulis:
Revisiting kernelized locality-sensitive hashing for improved large-scale image retrieval. CVPR 2015: 4933-4941 - [c18]Liang Wen, Wei Jiang, Ke Jiang, Xia Zhang, Xiong Pan, Keran Zhou:
Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective. HPCC/CSS/ICESS 2015: 700-705 - 2014
- [j4]Zhigao Cui, Aihua Li, Ke Jiang:
Cooperative Moving Object Segmentation using Two Cameras based on Background Subtraction and Image Registration. J. Multim. 9(3): 363-370 (2014) - [j3]George A. Barnett, Han Woo Park, Ke Jiang, Chuan Tang, Isidro F. Aguillo:
A multi-level network analysis of web-citations among the world's universities. Scientometrics 99(1): 5-26 (2014) - [c17]Wei Jiang, Ke Jiang, Xia Zhang, Yue Ma:
Energy aware real-time scheduling policy with guaranteed security protection. ASP-DAC 2014: 317-322 - [c16]Ke Jiang, Lejla Batina, Petru Eles, Zebo Peng:
Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks. ISVLSI 2014: 450-455 - [i1]Ke Jiang, Qichao Que, Brian Kulis:
Revisiting Kernelized Locality-Sensitive Hashing for Improved Large-Scale Image Retrieval. CoRR abs/1411.4199 (2014) - 2013
- [j2]Ke Jiang, Aihua Li, Zhigao Cui, Tao Wang, Yanzhao Su:
Adaptive shadow detection using global texture and sampling deduction. IET Comput. Vis. 7(2): 115-122 (2013) - [c15]Ke Jiang, Petru Eles, Zebo Peng:
Optimization of secure embedded systems with dynamic task sets. DATE 2013: 1765-1770 - [c14]Ke Jiang, Xiaotian Wang, Hulong Lei, Wei Yang, Yin Wu:
Investigation of muscle degeneration process in young rats with ischemia injury using MR diffusion tensor imaging. EMBC 2013: 81-84 - [c13]Xia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma, Ke Jiang:
Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems. IPDPS Workshops 2013: 741-750 - [c12]Anirban Roychowdhury, Ke Jiang, Brian Kulis:
Small-Variance Asymptotics for Hidden Markov Models. NIPS 2013: 2103-2111 - [c11]Ke Jiang, Adrian Alin Lifa, Petru Eles, Zebo Peng, Wei Jiang:
Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors. RTNS 2013: 109-118 - 2012
- [c10]Ke Jiang, Jianhua Liu, Ruxin Ning, Weidong Liu:
Collaborative design of tolerance for assembly based on variation skeleton model. CSCWD 2012: 830-836 - [c9]Ke Jiang, Petru Eles, Zebo Peng:
Co-design techniques for distributed real-time embedded systems with communication security constraints. DATE 2012: 947-952 - [c8]Ke Jiang, Brian Kulis, Michael I. Jordan:
Small-Variance Asymptotics for Exponential Family Dirichlet Process Mixture Models. NIPS 2012: 3167-3175 - [c7]Wei Jiang, Ke Jiang, Yue Ma:
Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint. RTCSA 2012: 330-339 - 2011
- [c6]Ke Jiang, Petru Eles, Zebo Peng:
Optimization of message encryption for distributed embedded systems with real-time constraints. DDECS 2011: 243-248 - 2010
- [c5]Xueyan Cao, Ke Jiang, Xiaolin Li, Shiming Li:
A fast disasters assessment algorithm with fuzzy, incomplete and noisy information. ICIS 2010: 660-665
2000 – 2009
- 2008
- [j1]Ke Jiang, Lei Zhang, Shigeru Miyake:
Using OCL in Executable UML. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 9 (2008) - 2007
- [c4]Ke Jiang, Lei Zhang, Shigeru Miyake:
An Executable UML with OCL-based Action Semantics Language. APSEC 2007: 302-309 - [c3]Ke Jiang, Lei Zhang, Shigeru Miyake:
OCL4X: An Action Semantics Language for UML Model Execution. COMPSAC (1) 2007: 633-636 - 2005
- [c2]Wenqiang Dai, Peng Xiao, Ke Jiang:
Facility Location in a Global View. AAIM 2005: 142-150 - 2002
- [c1]Ke Jiang, Yihe Sun:
An Optimizing Search Method of Systolic Array Design. IASTED PDCS 2002: 573-577
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint