default search action
Jianmin Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Datian Peng, Jianmin Dong, Mingjiang Zhang, Jungang Yang, Zhen Wang:
CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example Attacks. IEEE Trans. Inf. Forensics Secur. 19: 5940-5955 (2024) - [c13]Jianmin Dong:
Automated Direction Change and Edge Detection Techniques based on Fuzzy PID and Artificial Intelligence. FAIML 2024: 180-184 - [c12]Jianmin Dong, Datian Peng, Taihao Li:
Least-Effort Adversarial Attack Against Gait-Based Identity Recognition System. ICASSP 2024: 4695-4699 - 2023
- [j7]Datian Peng, Jianmin Dong, Jungang Yang, Taihao Li, Qinke Peng:
Dense Overload Subgraph Induced by Cyber-Physical Attacks in Smart Grid. IEEE Trans. Circuits Syst. II Express Briefs 70(2): 611-615 (2023) - [c11]Jianmin Dong, Datian Peng, Guanxiong Pei, Taihao Li:
Poisoning Attacks against Gait-based Identity Recognition. APSIPA ASC 2023: 922-926 - [c10]Jianmin Dong, Kai Fang, Taihao Li:
Optimal Targeted Attacks Against Gait-Based Identity Recognition. SMC 2023: 38-43 - 2022
- [j6]Datian Peng, Jianmin Dong, Jungang Yang, Qinke Peng:
Dynamical Failures Driven by False Load Injection Attacks Against Smart Grid. IEEE Trans. Inf. Forensics Secur. 17: 2213-2226 (2022) - [c9]Yan Wang, Xiang Li, Pei-Xiang Bai, Haibo Wang, Jianmin Dong:
An Efficient Big Data Storage Service Architecture. CSCWD 2022: 740-745 - [c8]Haixia Lang, Yu-Ying Li, Yan Wang, Haibo Wang, Jianmin Dong:
An Automatic Topic-oriented Structured Text Extraction Method based on CRF and Deep Learning. CSCWD 2022: 1408-1413 - 2021
- [c7]Yuefeng Liu, Wei Guo, Hanyu Zhang, Haodong Bian, Yingjie He, Xiaoyan Zhang, Yanzhang Gong, Jianmin Dong, Zhen Liu:
Construction of Knowledge Graph Based on Discipline Inspection and Supervision. TrustCom 2021: 1467-1472 - 2020
- [j5]Jianmin Dong, Youtian Du, Zhongmin Cai:
Gender recognition using motion data from multiple smart devices. Expert Syst. Appl. 147: 113195 (2020) - [j4]Datian Peng, Jianmin Dong, Qinke Peng:
Overloaded Branch Chains Induced by False Data Injection Attack in Smart Grid. IEEE Signal Process. Lett. 27: 426-430 (2020)
2010 – 2019
- 2019
- [j3]Aghil Esmaeili Kelishomi, A. H. S. Garmabaki, Mahdi Bahaghighat, Jianmin Dong:
Mobile User Indoor-Outdoor Detection through Physical Daily Activities. Sensors 19(3): 511 (2019) - [c6]Datian Peng, Jianmin Dong, Qinke Peng, Bo Zeng, Zhi-Hong Mao:
FDIA-Identified Overloaded Power Lines. SciSec 2019: 262-277 - 2018
- [c5]Datian Peng, Jianmin Dong, Jianan Jian, Qinke Peng, Bo Zeng, Zhi-Hong Mao:
Economic-Driven FDI Attack in Electricity Market. SciSec 2018: 216-224 - 2017
- [j2]Jianmin Dong, Zhongmin Cai, Shaoyi Du:
Improvement of affine iterative closest point algorithm for partial registration. IET Comput. Vis. 11(2): 135-144 (2017) - 2016
- [c4]Jianmin Dong, Zhongmin Cai:
User Authentication Using Motion Sensor Data from Both Wearables and Smartphones. CCBR 2016: 756-764 - [c3]Shaoyi Du, Jianmin Dong, Guanglin Xu, Bo Bi, Zhongmin Cai:
An Improvement of Affine Iterative Closest Point Algorithm for Partial Registration. ICIMCS 2016: 72-75 - 2014
- [j1]Jianmin Dong, Yaxin Peng, Shihui Ying, Zhiyu Hu:
LieTrICP: An improvement of trimmed iterative closest point algorithm. Neurocomputing 140: 67-76 (2014) - 2011
- [c2]Jianmin Dong, Zhengqi Sun, Yansong Li:
Regression on pulmonary volume and function on the youth from Qinghai-Tibet Plateau. BMEI 2011: 1781-1784
2000 – 2009
- 2008
- [c1]Jianmin Dong, Mingquan Zhou:
Medical Image Segmentation Based on Topology Correlation of Regions. BMEI (2) 2008: 142-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint