default search action
Jingyu Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Jingyu Xiao, Qing Li, Dan Zhao, Xudong Zuo, Wenxin Tang, Yong Jiang:
Themis: A passive-active hybrid framework with in-network intelligence for lightweight failure localization. Comput. Networks 255: 110836 (2024) - [j14]Qi Zhang, Jingyu Xiao, Shichao Zhang, Jerry Chun-Wei Lin, Chunwei Tian, Chengyuan Zhang:
Texture-guided CNN for image denoising. Multim. Tools Appl. 83(23): 63949-63973 (2024) - [j13]Chunwei Tian, Jingyu Xiao, Bob Zhang, Wangmeng Zuo, Yudong Zhang, Chia-Wen Lin:
A self-supervised network for image denoising and watermark removal. Neural Networks 174: 106218 (2024) - [j12]Jingyu Xiao, Xudong Zuo, Qing Li, Dan Zhao, Hanyu Zhao, Yong Jiang, Jiyong Sun, Bin Chen, Yong Liang, Jie Li:
FlexNF: Flexible Network Function Orchestration for Scalable On-Path Service Chain Serving. IEEE/ACM Trans. Netw. 32(3): 2026-2041 (2024) - [c5]Jingyu Xiao, Zhiyao Xu, Qingsong Zou, Qing Li, Dan Zhao, Dong Fang, Ruoyu Li, Wenxin Tang, Kang Li, Xudong Zuo, Penghui Hu, Yong Jiang, Zixuan Weng, Michael R. Lyu:
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask. KDD 2024: 3551-3562 - [i1]Jingyu Xiao, Zhiyao Xu, Qingsong Zou, Qing Li, Dan Zhao, Dong Fang, Ruoyu Li, Wenxin Tang, Kang Li, Xudong Zuo, Penghui Hu, Yong Jiang, Zixuan Weng, Michael R. Lyv:
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask. CoRR abs/2406.10928 (2024) - 2023
- [j11]Weixun Li, Xiangyang Du, Jingyu Xiao, Limin Zhang:
Bipartite hybrid formation tracking control for heterogeneous multi-agent systems in multi-group cooperative-competitive networks. Appl. Math. Comput. 456: 128133 (2023) - [j10]Qi Zhang, Jingyu Xiao, Chunwei Tian, Jerry Chun-Wei Lin, Shichao Zhang:
A robust deformed convolutional neural network (CNN) for image denoising. CAAI Trans. Intell. Technol. 8(2): 331-342 (2023) - [j9]Qi Zhang, Jingyu Xiao, Chunwei Tian, Jiayu Xu, Shichao Zhang, Chia-Wen Lin:
A parallel and serial denoising network. Expert Syst. Appl. 231: 120628 (2023) - [j8]Qingsong Zou, Qing Li, Ruoyu Li, Yucheng Huang, Gareth Tyson, Jingyu Xiao, Yong Jiang:
IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 43:1-43:26 (2023) - [j7]Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Zixuan Weng, Ruoyu Li, Yong Jiang:
I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 136:1-136:28 (2023) - [j6]Xiangyang Du, Weixun Li, Jingyu Xiao, Zengqiang Chen:
Bipartite time-varying formation group containment control for multi-agent systems based on multi-layer network and semi-signed directed graph. J. Frankl. Inst. 360(3): 1929-1952 (2023) - [j5]Zhengxin Zhang, Qing Li, Guanglin Duan, Dan Zhao, Jingyu Xiao, Guorui Xie, Yong Jiang:
Pontus: Finding Waves in Data Streams. Proc. ACM Manag. Data 1(1): 106:1-106:26 (2023) - [c4]Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Wenxin Tang, Runjie Zhou, Yong Jiang:
User Device Interaction Prediction via Relational Gated Graph Attention Network and Intent-aware Encoder. AAMAS 2023: 1634-1642 - 2022
- [j4]Xiangyang Du, Weixun Li, Jingyu Xiao, Zengqiang Chen:
Time-Varying Group Formation With Adaptive Control for Second-Order Multi-Agent Systems. IEEE Access 10: 45337-45346 (2022) - [c3]Xudong Zuo, Qing Li, Jingyu Xiao, Dan Zhao, Jiang Yong:
Drift-bottle: a lightweight and distributed approach to failure localization in general networks. CoNEXT 2022: 337-348 - [c2]Congcong Miao, Minggang Chen, Arpit Gupta, Zili Meng, Lianjin Ye, Jingyu Xiao, Jie Chen, Zekun He, Xulong Luo, Jilong Wang, Heng Yu:
Detecting Ephemeral Optical Events with OpTel. NSDI 2022: 339-353 - 2021
- [c1]Lianjin Ye, Qing Li, Xudong Zuo, Jingyu Xiao, Yong Jiang, Zhuyun Qi, Chunsheng Zhu:
PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection. IPCCC 2021: 1-8
2010 – 2019
- 2014
- [j3]Jingjun Zhao, Jingyu Xiao, Neville J. Ford:
Collocation methods for fractional integro-differential equations with weakly singular kernels. Numer. Algorithms 65(4): 723-743 (2014) - 2013
- [j2]Neville J. Ford, Maria Manuela Fernandes Rodrigues, Jingyu Xiao, Yubin Yan:
Numerical analysis of a two-parameter fractional telegraph equation. J. Comput. Appl. Math. 249: 95-106 (2013) - 2012
- [j1]Neville J. Ford, Jingyu Xiao, Yubin Yan:
Stability of a Numerical Method for a Space-time-fractional Telegraph Equation. Comput. Methods Appl. Math. 12(3): 273-288 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint