default search action
Jing Long
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Jing Long, Cuiting Luo, Ruxin Chen, Jianping Yu, Kuan-Ching Li:
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection. J. Supercomput. 80(8): 10444-10468 (2024) - [c20]Jing Long, Guanhua Ye, Tong Chen, Yang Wang, Meng Wang, Hongzhi Yin:
Diffusion-Based Cloud-Edge-Device Collaborative Learning for Next POI Recommendations. KDD 2024: 2026-2036 - [c19]Jing Long, Tong Chen, Guanhua Ye, Kai Zheng, Quoc Viet Hung Nguyen, Hongzhi Yin:
Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation. WWW 2024: 3379-3387 - [i6]Hongzhi Yin, Liang Qu, Tong Chen, Wei Yuan, Ruiqi Zheng, Jing Long, Xin Xia, Yuhui Shi, Chengqi Zhang:
On-Device Recommender Systems: A Comprehensive Survey. CoRR abs/2401.11441 (2024) - [i5]Jing Long, Tong Chen, Guanhua Ye, Kai Zheng, Nguyen Quoc Viet Hung, Hongzhi Yin:
Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation. CoRR abs/2401.14583 (2024) - [i4]Jing Long, Guanhua Ye, Tong Chen, Yang Wang, Meng Wang, Hongzhi Yin:
Diffusion-Based Cloud-Edge-Device Collaborative Learning for Next POI Recommendations. CoRR abs/2405.13811 (2024) - 2023
- [j26]Jing Long, Fei Fang, Cuiting Luo, Yehua Wei, Tien-Hsiung Weng:
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance. Connect. Sci. 35(1) (2023) - [j25]Jianzhou Feng, Jing Long, Chunlong Han, Zhongcan Ren, Qin Wang:
RepSum: A general abstractive summarization framework with dynamic word embedding representation correction. Comput. Speech Lang. 80: 101491 (2023) - [j24]Defeng Ding, Yehua Wei, Can Cheng, Jing Long:
Intrusion Detection for In-Vehicle CAN Bus Based on Lightweight Neural Network. J. Circuits Syst. Comput. 32(7): 2350110:1-2350110:16 (2023) - [j23]Longjun Liu, Jing Long, Ruhong Liu, Qing Fan, Wenhai Wan:
Examining how and when digital platform capabilities drive technological innovation: a strategic information perspective. J. Enterp. Inf. Manag. 36(2): 553-582 (2023) - [j22]Jing Long, Wei Liang, Kuan-Ching Li, Yehua Wei, Mario Donato Marino:
A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1747-1755 (2023) - [j21]Jing Long, Tong Chen, Quoc Viet Hung Nguyen, Hongzhi Yin:
Decentralized Collaborative Learning Framework for Next POI Recommendation. ACM Trans. Inf. Syst. 41(3): 66:1-66:25 (2023) - [c18]Jing Long, Cuiting Luo, Ruxin Chen, Wei Liang, Zheng Qin:
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things. ISPA/BDCloud/SocialCom/SustainCom 2023: 207-212 - [c17]Jing Long, Cuiting Luo, Ruxin Chen:
Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model. CSCloud/EdgeCom 2023: 161-166 - [c16]Wei Li, Yongwei Fan, Xi Xiao, Fang Xie, Ping Zeng, Zhigang Liu, Yanwei Fu, Jing Long, Xiao Wang:
Incremental Multivariate State Estimation Technique-Based Fault Estimation Method for Motor-driven High-Voltage Circuit Breakers. CSCloud/EdgeCom 2023: 311-317 - [c15]Jing Long, Tong Chen, Quoc Viet Hung Nguyen, Guandong Xu, Kai Zheng, Hongzhi Yin:
Model-Agnostic Decentralized Collaborative Learning for On-Device POI Recommendation. SIGIR 2023: 423-432 - [c14]Yijie Liu, Lijun Xiao, Dezhi Han, Jing Long:
Telematics Communication Based on Blockchain Technology. SmartCloud 2023: 136-141 - [i3]Jing Long, Tong Chen, Nguyen Quoc Viet Hung, Guandong Xu, Kai Zheng, Hongzhi Yin:
Model-Agnostic Decentralized Collaborative Learning for On-Device POI Recommendation. CoRR abs/2304.03947 (2023) - 2022
- [c13]Tong Chen, Hongzhi Yin, Jing Long, Quoc Viet Hung Nguyen, Yang Wang, Meng Wang:
Thinking inside The Box: Learning Hypercube Representations for Group Recommendation. SIGIR 2022: 1664-1673 - [c12]Jiaying Lin, Yehua Wei, Haoran Jiang, Jing Long:
Intrusion Detection System for In-vehicle Networks with Incremental Learning Based on Cloud-Edge Collaborative Architecture. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2026-2031 - [i2]Tong Chen, Hongzhi Yin, Jing Long, Quoc Viet Hung Nguyen, Yang Wang, Meng Wang:
Thinking inside The Box: Learning Hypercube Representations for Group Recommendation. CoRR abs/2204.02592 (2022) - [i1]Jing Long, Tong Chen, Nguyen Quoc Viet Hung, Hongzhi Yin:
Decentralized Collaborative Learning Framework for Next POI Recommendation. CoRR abs/2204.06516 (2022) - 2021
- [j20]Jing Long, Xin Su:
Anonymous chaotic-based identity authentication protocol in IoT. Int. J. Embed. Syst. 14(2): 194-200 (2021) - [j19]Yahui Li, Jian Mou, Liying Ye, Jing Long, Wei (Wayne) Huang:
An empirical investigation of the utilitarian, social benefits in LBS information disclosure - The moderating effect of the gender based social role theory. Int. J. Inf. Manag. 56: 102243 (2021) - [j18]Wei Liang, Jing Long, Kuan-Ching Li, Jianbo Xu, Nanjun Ma, Xia Lei:
A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering. ACM Trans. Multim. Comput. Commun. Appl. 17(2): 42:1-42:16 (2021) - [c11]Jing Long, Fei Fang, Haibo Luo:
A Novel GNN Model for Fraud Detection in Online Trading Activities. ICA3PP (2) 2021: 603-614 - [c10]Jing Long, Fei Fang, Haibo Luo:
A Survey of Machine Learning-based IoT Intrusion Detection Techniques. SmartCloud 2021: 7-12 - [c9]Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long:
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. UbiSec 2021: 255-267 - 2020
- [j17]Bin Liu, Lijun Xiao, Jing Long, Mingdong Tang, Osama Hosam:
Secure Digital Certificate-Based Data Access Control Scheme in Blockchain. IEEE Access 8: 91751-91760 (2020) - [j16]Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long:
A robust error control coding-based watermarking algorithm for FPGA IP protection. Int. J. Embed. Syst. 13(2): 209-220 (2020) - [j15]Wei Liang, Weihong Huang, Jing Long, Ke Zhang, Kuan-Ching Li, Dafang Zhang:
Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment. IEEE Internet Things J. 7(7): 6392-6401 (2020) - [j14]Wei Liang, Kuan-Ching Li, Jing Long, Xiaoyan Kui, Albert Y. Zomaya:
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model. IEEE Trans. Ind. Informatics 16(3): 2063-2071 (2020)
2010 – 2019
- 2019
- [j13]Jing Long, Wei Liang, Kuan-Ching Li, Dafang Zhang, Mingdong Tang, Haibo Luo:
PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment. IEEE Access 7: 124785-124796 (2019) - [j12]Wei Liang, Jing Long, Tien-Hsiung Weng, Xuhui Chen, Kuan-Ching Li, Albert Y. Zomaya:
TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener. Comput. Syst. 92: 383-398 (2019) - [j11]Wei Liang, Jing Long, Xia Lei, Zhiqiang You, Haibo Luo, Jiahong Cai, Kuan-Ching Li:
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference. Future Gener. Comput. Syst. 100: 132-143 (2019) - [j10]Wei Liang, Songyou Xie, Jing Long, Kuan-Ching Li, Dafang Zhang, Keqin Li:
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 503: 129-147 (2019) - [j9]Wei Liang, Mingdong Tang, Jing Long, Xin Peng, Jianlong Xu, Kuan-Ching Li:
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3582-3592 (2019) - 2018
- [j8]Wei Liang, Mingdong Tang, Jing Long, Arun Kumar Sangaiah, Yin Huang:
SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature. Comput. Electr. Eng. 65: 310-321 (2018) - [j7]Wei Liang, Jing Long, Zuo Chen, Xiaolong Yan, Yanbiao Li, Qingyong Zhang, Kuan-Ching Li:
A Security Situation Prediction Algorithm Based on HMM in Mobile Network. Wirel. Commun. Mob. Comput. 2018: 5380481:1-5380481:11 (2018) - [c8]Yin Huang, Wei Liang, Jing Long, Jianbo Xu, Kuan-Ching Li:
A Novel Identity Authentication for FPGA Based IP Designs. TrustCom/BigDataSE 2018: 1531-1536 - [c7]Jing Long, Dafang Zhang, Wei Liang, Kuan-Ching Li:
A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 287-292 - [p1]Wei Liang, Jing Long, Dafang Zhang, Xiong Li, Yin Huang:
Study on IP Protection Techniques for Integrated Circuit in IOT Environment. Internet of Everything 2018: 193-216 - 2017
- [j6]Wei Liang, Jing Long, Xuhui Chen, Yongkai Fan, Weidong Xiao:
A new publicly verifiable blind detection scheme for intellectual property protection. Int. J. Syst. Assur. Eng. Manag. 8(3s): 2017-2029 (2017) - 2016
- [j5]Jing Long, Dafang Zhang, Chen Zuo, Jiajun Duan, Weihong Huang:
A robust low-overhead watermarking for field authentication of intellectual property cores. Comput. Sci. Inf. Syst. 13(2): 609-622 (2016) - [j4]Wei Liang, Bo Liao, Jing Long, Yan Jiang, Li Peng:
Study on PUF based secure protection for IC design. Microprocess. Microsystems 45: 56-66 (2016) - [j3]Xinpeng Zhang, Jing Long, Zichi Wang, Hang Cheng:
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1622-1631 (2016) - 2015
- [j2]Sheng-hua Zhong, Yang Liu, Bin Li, Jing Long:
Query-oriented unsupervised multi-document summarization via deep learning model. Expert Syst. Appl. 42(21): 8146-8155 (2015) - [j1]Jing Long, Dafang Zhang, Wei Liang, Xia-an Bi:
Signature Restoration for Enhancing Robustness of FPGA IP Designs. Int. J. Inf. Secur. Priv. 9(3): 41-56 (2015) - [c6]Jing Long, Dafang Zhang, Wei Liang, Wenwei Li:
A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection. TrustCom/BigDataSE/ISPA (1) 2015: 230-237 - 2014
- [c5]Yanbiao Li, Dafang Zhang, Xian Yu, Jing Long, Wei Liang:
From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup. FCCM 2014: 106 - [c4]Yanbiao Li, Dafang Zhang, Xian Yu, Wei Liang, Jing Long, Hong Qiao:
Accelerate NDN name lookup using FPGA: Challenges and a scalable approach. FPL 2014: 1-4 - 2013
- [c3]Wei Liang, Da-Fang Zhang, Jing Long, Yanbiao Li, Yan-Ji Hu, Xiong Li:
An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors. HPCC/EUC 2013: 533-540 - 2011
- [c2]Jing Long, Jianbo Xu, Wei Liang:
An FPGA-based distributed IP watermarking method. EMEIT 2011: 1715-1717 - [c1]Xiaoxiang Chen, Huiqin Ma, Yunnan Xiao, Li Zhen, Jing Long, Yanjun Deng:
A Study of Mandarin Segmental and Monosyllabic Intervals of CB and Early Speech. ICPhS 2011: 460-463
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint