157 results on '"Jun Jiang"'
Search Results
2. CoSPAM: Multi-Robot Collaboration Simultaneous Path Planning and Semantic Mapping.
3. Automatic Multi-label Classification of Interictal Epileptiform Discharges (IED) Detection Based on Scalp EEG and Transformer.
4. Evolutionary Multitasking with Compatibility Graph for Point Cloud Registration.
5. HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence.
6. Event-triggered Reconfiguration Scheduling of Hypergraph-based System-of-systems: the Resilience Reaction.
7. TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence.
8. Experiencing InstructPipe: Building Multi-modal AI Pipelines via Prompting LLMs and Visual Programming.
9. A Method for Anti-Leakage in Car Insurance Based on the Co-Occurrence Relationship Between Auto Parts.
10. FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model.
11. A Precise Interictal Epileptiform Discharge (IED) Detection Approach Based on Transformer.
12. WAVELET2VEC: A Filter Bank Masked Autoencoder for EEG-Based Seizure Subtype Classification.
13. Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain.
14. AI-based SoS performance classification for resilience reaction.
15. Experiencing Visual Blocks for ML: Visual Prototyping of AI Pipelines.
16. Alleviating Overconfident Failure Predictions via Masking Predictive Logits in Semantic Segmentation.
17. BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment.
18. Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention.
19. TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*.
20. Approximate Nearest Neighbor Search under Neural Similarity Metric for Large-Scale Recommendation.
21. A Graph Learning Approach with Audit Records for Advanced Attack Investigation.
22. Energy Efficient Resource Scheduling in Cloud Computing Based on Task Arrival Model.
23. MIPI 2022 Challenge on RGB+ToF Depth Completion: Dataset and Report.
24. MIPI 2022 Challenge on Quad-Bayer Re-mosaic: Dataset and Report.
25. MIPI 2022 Challenge on Under-Display Camera Image Restoration: Methods and Results.
26. Reversed Image Signal Processing and RAW Reconstruction. AIM 2022 Challenge Report.
27. MIPI 2022 Challenge on RGBW Sensor Re-mosaic: Dataset and Report.
28. Overexposure Mask Fusion: Generalizable Reverse ISP Multi-step Refinement.
29. MIPI 2022 Challenge on RGBW Sensor Fusion: Dataset and Report.
30. APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field.
31. CSPM: A Coordinated Software Prefetching Mechanism For Multi-Level Caches.
32. A Resilience Implementation Framework of System-of-Systems based on Hypergraph Model.
33. STAR: A Structure-aware Lightweight Transformer for Real-time Image Enhancement.
34. Controlled domain wall directions within nanodevices integrated on the surface of LiNbO3 single crystals.
35. Energy Consumption Minimization for Multi-carrier NOMA Visible Light Communication Downlinks.
36. FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
37. Improve the Field-of-view of Cameras: Consideration on the Micro Lens Array.
38. An improved ResNet network based healing judgment algorithm for grafted seedlings.
39. Practical Face Swapping Detection Based on Identity Spatial Constraints.
40. Normal Distribution Function on Descriptor Extraction.
41. The Application of Scaffolding Instruction to English Writing Teaching in Junior Middle School in the Context of Wisdom Education in the Era of Big Data.
42. A Novel Variable Resolution Torque Sensor Based on Variable Stiffness Principle.
43. Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.
44. A Framework for Document-level Cybersecurity Event Extraction from Open Source Data.
45. CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
46. Model Computation with Second-Order Radiative Transfer Equation for Snow Medium Using Coupled Finite Element Method and Method of Moment and Relaxed Hierarchical Equivalent Source Algorithm.
47. Inter-Job Scheduling of High-Throughput Material Screening Applications.
48. Research on the Innovation of BIM Technology in the Education of Road and Bridge Engineering Specialty.
49. NER in Threat Intelligence Domain with TSFL.
50. Development of an Intelligent LED Lighting Control Testbed for IoT-based Smart Greenhouses.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.