dblp: Yong Jin
https://dblp.org/pid/89/6327.html
dblp person page RSS feedMon, 02 Dec 2024 22:26:23 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Yong Jinhttps://dblp.org/pid/89/6327.html14451Adaptive hypergraph regularized logistic regression model for bioinformatic selection and classification.https://doi.org/10.1007/s10489-024-05304-5Yong Jin, Huaibin Hou, Mian Qin, Wei Yang, Zhen Zhang: Adaptive hypergraph regularized logistic regression model for bioinformatic selection and classification.Appl. Intell.54(3): 2349-2360 (2024)]]>https://dblp.org/rec/journals/apin/JinHQYZ24Thu, 01 Feb 2024 00:00:00 +0100Research on Discrimination Method of Carbon Deposit Degree of Automobile Engine Based on Deep Learning.https://doi.org/10.31577/cai_2024_1_126Qian Huang, Youxing Chen, Zhaoba Wang, Xiang Chen, Asoke K. Nandi, Maozhen Li, Yong Jin: Research on Discrimination Method of Carbon Deposit Degree of Automobile Engine Based on Deep Learning.Comput. Informatics43(1): 126-148 (2024)]]>https://dblp.org/rec/journals/cai/HuangCWCNLJ24Mon, 01 Jan 2024 00:00:00 +0100Energy-Distance-Function-Based Improved K-Means for Clustering Routing Algorithm.https://doi.org/10.1109/JIOT.2024.3427395Lin Zhou, Meng Zhang, Qian Wei, Yong Jin, Saidi Wang, Jiayuan Yan: Energy-Distance-Function-Based Improved K-Means for Clustering Routing Algorithm.IEEE Internet Things J.11(22): 36763-36774 (2024)]]>https://dblp.org/rec/journals/iotj/ZhouZWJWY24Fri, 01 Nov 2024 00:00:00 +0100Conflict evidence fusion method based on improved conflict coefficient and belief entropy.https://doi.org/10.3233/jifs-221507Junwei Li, Huanyu Liu, Yong Jin, Aoxiang Zhao: Conflict evidence fusion method based on improved conflict coefficient and belief entropy.J. Intell. Fuzzy Syst.46(1): 1973-1984 (2024)]]>https://dblp.org/rec/journals/jifs/LiLJZ24Mon, 01 Jan 2024 00:00:00 +0100Research on probabilistic language multi-attribute group decision-making method based on correlation coefficient and improved entropy.https://doi.org/10.3233/jifs-235593Junwei Li, Mengmeng Lian, Yong Jin, Miaomiao Xia, Huaibin Hou: Research on probabilistic language multi-attribute group decision-making method based on correlation coefficient and improved entropy.J. Intell. Fuzzy Syst.46(4): 9465-9478 (2024)]]>https://dblp.org/rec/journals/jifs/LiLJXH24Mon, 01 Jan 2024 00:00:00 +0100Generating method and application of basic probability assignment based on interval number distance and model reliability.https://doi.org/10.1007/s00500-023-09325-zJunwei Li, Baolin Xie, Yong Jin, Lin Zhou: Generating method and application of basic probability assignment based on interval number distance and model reliability.Soft Comput.28(3): 2353-2365 (2024)]]>https://dblp.org/rec/journals/soco/LiXJZ24Thu, 01 Feb 2024 00:00:00 +0100Customized scheduling for shared bus with deadlines.https://doi.org/10.1002/spe.3145Yong Jin, Jia Xu, Lijie Xu, Linfeng Liu, Fu Xiao: Customized scheduling for shared bus with deadlines.Softw. Pract. Exp.54(10): 1916-1938 (2024)]]>https://dblp.org/rec/journals/spe/JinXXLX24Mon, 01 Jan 2024 00:00:00 +0100Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks.https://doi.org/10.1007/s11227-024-06059-zHongtai Yao, Zewen Li, Yong Jin, Zhentao Hu, Qinglan Peng: Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks.J. Supercomput.80(11): 15362-15385 (2024)]]>https://dblp.org/rec/journals/tjs/YaoLJHP24Mon, 01 Jul 2024 01:00:00 +0200A Range-Free Node Localization Method Based on MinMax Error Criterion for Sparse Anchors Wireless Sensor Networks.https://doi.org/10.1109/TVT.2024.3351877Zhentao Hu, Lin Zhou, Lu Zhang, Yong Jin, Qian Wei: A Range-Free Node Localization Method Based on MinMax Error Criterion for Sparse Anchors Wireless Sensor Networks.IEEE Trans. Veh. Technol.73(6): 9182-9186 (2024)]]>https://dblp.org/rec/journals/tvt/HuZZJW24Sat, 01 Jun 2024 01:00:00 +0200Privacy Preserved IoT Data Inquiry System using DoT.https://doi.org/10.1109/CIoT63799.2024.10757083Hayato Sagara, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai: Privacy Preserved IoT Data Inquiry System using DoT.CIoT2024: 1-6]]>https://dblp.org/rec/conf/ciot/SagaraJIT24Mon, 01 Jan 2024 00:00:00 +0100Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture.https://doi.org/10.1109/COMPSAC61105.2024.00235Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai: Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture.COMPSAC2024: 1554-1555]]>https://dblp.org/rec/conf/compsac/SunaharaJIYT24Mon, 01 Jan 2024 00:00:00 +0100How to Survive Private Data Leak Incidents in Campus IT Systems?https://doi.org/10.1145/3599732.3641325Yong Jin, Satoshi Matsuura, Masahiko Tomoishi: How to Survive Private Data Leak Incidents in Campus IT Systems?SIGUCCS2024: 44-46]]>https://dblp.org/rec/conf/siguccs/JinMT24Mon, 01 Jan 2024 00:00:00 +0100Delamination Depth Evaluation in Near-Surface of GFRP Laminates Based on RQA-MKLSVM Model.https://doi.org/10.1109/ACCESS.2023.3262133Wei Guo, Zhaoba Wang, Youxing Chen, Yong Jin, Qizhou Wu: Delamination Depth Evaluation in Near-Surface of GFRP Laminates Based on RQA-MKLSVM Model.IEEE Access11: 30908-30919 (2023)]]>https://dblp.org/rec/journals/access/GuoWCJW23Sun, 01 Jan 2023 00:00:00 +0100Continuous Terahertz Wave Imaging for Debonding Detection and Visualization Analysis in Layered Structures.https://doi.org/10.1109/ACCESS.2023.3252372Kailiang Xue, Youxing Chen, Wenna Zhang, Jialin Song, Zhaoba Wang, Yong Jin, Xin Guo: Continuous Terahertz Wave Imaging for Debonding Detection and Visualization Analysis in Layered Structures.IEEE Access11: 31607-31618 (2023)]]>https://dblp.org/rec/journals/access/XueCZSWJG23Sun, 01 Jan 2023 00:00:00 +0100Review on the Research Progress of Arc Plasma Power Sources in China.https://doi.org/10.1109/ACCESS.2023.3342646Yong Jin, Yue Li, Chuan Jiang, Hailong Yu: Review on the Research Progress of Arc Plasma Power Sources in China.IEEE Access11: 141394-141405 (2023)]]>https://dblp.org/rec/journals/access/JinLJY23Sun, 01 Jan 2023 00:00:00 +0100Will you stick to a high-quality collecting standard? order fulfillment vs. limited supply in diseconomy-cost-mattered remanufacturing operations.https://doi.org/10.1016/j.cie.2023.109569Fanzhuo Zeng, Baozhuang Niu, Zhiyuan Qi, Jianhua Zhang, Yong Jin, Qiyang Li: Will you stick to a high-quality collecting standard? order fulfillment vs. limited supply in diseconomy-cost-mattered remanufacturing operations.Comput. Ind. Eng.184: 109569 (2023)]]>https://dblp.org/rec/journals/candie/ZengNQZJL23Sun, 01 Oct 2023 01:00:00 +0200VGG-TSwinformer: Transformer-based deep learning model for early Alzheimer's disease prediction.https://doi.org/10.1016/j.cmpb.2022.107291Zhentao Hu, Zheng Wang, Yong Jin, Wei Hou: VGG-TSwinformer: Transformer-based deep learning model for early Alzheimer's disease prediction.Comput. Methods Programs Biomed.229: 107291 (2023)]]>https://dblp.org/rec/journals/cmpb/HuWJH23Wed, 01 Feb 2023 00:00:00 +0100Membership inference attacks against compression models.https://doi.org/10.1007/s00607-023-01180-yYong Jin, Weidong Lou, Yanghua Gao: Membership inference attacks against compression models.Computing105(11): 2419-2442 (2023)]]>https://dblp.org/rec/journals/computing/JinLG23Wed, 01 Nov 2023 00:00:00 +0100Towards cost-effective and robust AI microservice deployment in edge computing environments.https://doi.org/10.1016/j.future.2022.10.015Chunrong Wu, Qinglan Peng, Yunni Xia, Yong Jin, Zhentao Hu: Towards cost-effective and robust AI microservice deployment in edge computing environments.Future Gener. Comput. Syst.141: 129-142 (2023)]]>https://dblp.org/rec/journals/fgcs/WuPXJH23Sat, 01 Apr 2023 01:00:00 +0200Hybrid-Field Channel Estimation for Extremely Large-Scale Massive MIMO System.https://doi.org/10.1109/LCOMM.2022.3219937Zhentao Hu, Chaoyu Chen, Yong Jin, Lin Zhou, Qian Wei: Hybrid-Field Channel Estimation for Extremely Large-Scale Massive MIMO System.IEEE Commun. Lett.27(1): 303-307 (2023)]]>https://dblp.org/rec/journals/icl/HuCJZW23Sun, 01 Jan 2023 00:00:00 +0100Semantic Segmentation for Remote Sensing Image Using the Multigranularity Object-Based Markov Random Field With Blinking Coefficient.https://doi.org/10.1109/TGRS.2023.3301494Hongtai Yao, Le Zhao, Meng Tian, Yong Jin, Zhentao Hu, Qinglan Peng, Qian Qiu: Semantic Segmentation for Remote Sensing Image Using the Multigranularity Object-Based Markov Random Field With Blinking Coefficient.IEEE Trans. Geosci. Remote. Sens.61: 1-22 (2023)]]>https://dblp.org/rec/journals/tgrs/YaoZTJHPQ23Sun, 01 Jan 2023 00:00:00 +0100A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model.https://doi.org/10.1109/TITS.2022.3224385Zhenjiang Qian, Shan Zhong, Gaofei Sun, Xiaoshuang Xing, Yong Jin: A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model.IEEE Trans. Intell. Transp. Syst.24(12): 15459-15467 (2023)]]>https://dblp.org/rec/journals/tits/QianZSXJ23Fri, 01 Dec 2023 00:00:00 +0100Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis.https://doi.org/10.1109/TNSM.2022.3215681Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai: Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis.IEEE Trans. Netw. Serv. Manag.20(2): 2086-2095 (2023)]]>https://dblp.org/rec/journals/tnsm/MitsuhashiJIST23Thu, 01 Jun 2023 01:00:00 +0200Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis.https://doi.org/10.1109/CCNC51644.2023.10059835Rikima Mitsuhashi, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai: Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis.CCNC2023: 224-229]]>https://dblp.org/rec/conf/ccnc/MitsuhashiJIST23Sun, 01 Jan 2023 00:00:00 +0100A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems.https://doi.org/10.1109/COMPSAC57700.2023.00139Yong Jin, Masahiko Tomoishi: A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems.COMPSAC2023: 985-986]]>https://dblp.org/rec/conf/compsac/JinT23Sun, 01 Jan 2023 00:00:00 +0100Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers.https://doi.org/10.1109/COMPSAC57700.2023.00146Nariyoshi Yamai, Yong Jin, Toshio Murakami, Rei Nakagawa: Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers.COMPSAC2023: 1000-1001]]>https://dblp.org/rec/conf/compsac/YamaiJMN23Sun, 01 Jan 2023 00:00:00 +0100Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers.https://doi.org/10.1109/COMPSAC57700.2023.00169Toshio Murakami, Kenta Shimabukuro, Nao Sato, Rei Nakagawa, Yong Jin, Nariyoshi Yamai: Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers.COMPSAC2023: 1121-1126]]>https://dblp.org/rec/conf/compsac/MurakamiSSNJY23Sun, 01 Jan 2023 00:00:00 +0100Authoritative DNS Server Discovery Method to Enhance DNS Privacy Preservation.https://doi.org/10.1145/3630202.3630228Satoru Sunahara, Yong Jin, Katsuyoshi Iida: Authoritative DNS Server Discovery Method to Enhance DNS Privacy Preservation.StudentWorkshop@CoNEXT2023: 31-32]]>https://dblp.org/rec/conf/conext/SunaharaJI23Sun, 01 Jan 2023 00:00:00 +0100Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert.https://doi.org/10.1109/ICEIC57457.2023.10049906Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert.ICEIC2023: 1-6]]>https://dblp.org/rec/conf/elinfocom/JinTY23Sun, 01 Jan 2023 00:00:00 +0100Acceptance of Mobile Payment: A Cross-Cultural Examination Between Mainland China, Taiwan, and Germany.https://doi.org/10.1007/978-3-031-35969-9_20Vipin Saini, Julian Reckter, Yu-Chen Yang, Yong Jin: Acceptance of Mobile Payment: A Cross-Cultural Examination Between Mainland China, Taiwan, and Germany.HCI (28)2023: 293-301]]>https://dblp.org/rec/conf/hci/SainiRYJ23Sun, 01 Jan 2023 00:00:00 +0100An Improved DRL Algorithm for Reliable Path Planning.https://doi.org/10.1109/ICSPCC59353.2023.10400305Congcong Cheng, Lin Zhou, Qian Wei, Yong Jin, Junfang Leng, Xinlong Ding: An Improved DRL Algorithm for Reliable Path Planning.ICSPCC2023: 1-6]]>https://dblp.org/rec/conf/icspcc/ChengZWJLD23Sun, 01 Jan 2023 00:00:00 +0100Near-Field Channel Estimation for RIS Assisted 6G Wireless Communication.https://doi.org/10.1109/ICSPCC59353.2023.10400253Yong Jin, Hao Qi: Near-Field Channel Estimation for RIS Assisted 6G Wireless Communication.ICSPCC2023: 1-6]]>https://dblp.org/rec/conf/icspcc/JinQ23Sun, 01 Jan 2023 00:00:00 +0100Active RIS-Assisted Communication with Dynamic Sub-Connections.https://doi.org/10.1109/ICSPCC59353.2023.10400267Yong Jin, Yuansheng Zhao, Zewen Li: Active RIS-Assisted Communication with Dynamic Sub-Connections.ICSPCC2023: 1-5]]>https://dblp.org/rec/conf/icspcc/JinZL23Sun, 01 Jan 2023 00:00:00 +0100Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic.https://doi.org/10.1109/ISCIT57293.2023.10376042Hikaru Ichise, Yong Jin, Katsuyoshi Iida: Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic.ISCIT2023: 1-6]]>https://dblp.org/rec/conf/iscit/IchiseJI23Sun, 01 Jan 2023 00:00:00 +0100A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis.https://doi.org/10.1145/3539811.3579559Yong Jin, Satoshi Matsuura, Takao Kondo, Tatsumi Hosokawa, Masahiko Tomoishi: A Lightweight Abnormality Detection Mechanism by Stray Packets Analysis.SIGUCCS2023: 9-11]]>https://dblp.org/rec/conf/siguccs/JinMKHT23Sun, 01 Jan 2023 00:00:00 +0100Defect Identification of Adhesive Structure Based on DCGAN and YOLOv5.https://doi.org/10.1109/ACCESS.2022.3193775Yong Jin, Huifang Gao, Xiaoliang Fan, Hassan Khan, Youxing Chen: Defect Identification of Adhesive Structure Based on DCGAN and YOLOv5.IEEE Access10: 79913-79924 (2022)]]>https://dblp.org/rec/journals/access/JinGFKC22Sat, 01 Jan 2022 00:00:00 +0100Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight.https://doi.org/10.3390/e24091315Lin Zhou, Jiawei Wu, Qian Wei, Wentao Shi, Yong Jin: Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight.Entropy24(9): 1315 (2022)]]>https://dblp.org/rec/journals/entropy/ZhouWWSJ22Sat, 01 Jan 2022 00:00:00 +0100Secure Beamforming for IRS-Assisted Nonlinear SWIPT Systems With Full-Duplex User.https://doi.org/10.1109/LCOMM.2022.3171966Yong Jin, Ruijie Guo, Lin Zhou, Zhentao Hu: Secure Beamforming for IRS-Assisted Nonlinear SWIPT Systems With Full-Duplex User.IEEE Commun. Lett.26(7): 1494-1498 (2022)]]>https://dblp.org/rec/journals/icl/JinGZH22Sat, 01 Jan 2022 00:00:00 +0100Sensor Selection Scheme considering Uncertainty Disturbance.https://doi.org/10.1155/2022/2488907Wentao Shi, Dong Chen, Lin Zhou, Ke Bai, Yong Jin: Sensor Selection Scheme considering Uncertainty Disturbance.J. Sensors2022: 1-11 (2022)]]>https://dblp.org/rec/journals/js/ShiCZBJ22Sat, 01 Jan 2022 00:00:00 +0100Protein secondary structure prediction using a lightweight convolutional network and label distribution aware margin loss.https://doi.org/10.1016/j.knosys.2021.107771Wei Yang, Zhentao Hu, Lin Zhou, Yong Jin: Protein secondary structure prediction using a lightweight convolutional network and label distribution aware margin loss.Knowl. Based Syst.237: 107771 (2022)]]>https://dblp.org/rec/journals/kbs/YangHZJ22Sat, 01 Jan 2022 00:00:00 +0100Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty.https://doi.org/10.3390/s22010370Ruijie Guo, Chunling Fu, Yong Jin, Zhentao Hu, Lin Zhou: Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty.Sensors22(1): 370 (2022)]]>https://dblp.org/rec/journals/sensors/GuoFJHZ22Sat, 01 Jan 2022 00:00:00 +0100Robust DCF object tracking with adaptive spatial and temporal regularization based on target appearance variation.https://doi.org/10.1016/j.sigpro.2022.108463Lin Zhou, Yong Jin, Han Wang, Zhentao Hu, Shuaipeng Zhao: Robust DCF object tracking with adaptive spatial and temporal regularization based on target appearance variation.Signal Process.195: 108463 (2022)]]>https://dblp.org/rec/journals/sigpro/ZhouJWHZ22Sat, 01 Jan 2022 00:00:00 +0100Automatic Classification of Pavement Distress Using 3D Ground-Penetrating Radar and Deep Convolutional Neural Network.https://doi.org/10.1109/TITS.2022.3197712Xingmin Liang, Xin Yu, Chen Chen, Yong Jin, Jiandong Huang: Automatic Classification of Pavement Distress Using 3D Ground-Penetrating Radar and Deep Convolutional Neural Network.IEEE Trans. Intell. Transp. Syst.23(11): 22269-22277 (2022)]]>https://dblp.org/rec/journals/tits/LiangYCJH22Sat, 01 Jan 2022 00:00:00 +0100A Novel Range-Free Node Localization Method for Wireless Sensor Networks.https://doi.org/10.1109/LWC.2021.3140063Yong Jin, Lin Zhou, Lu Zhang, Zhentao Hu, Jing Han: A Novel Range-Free Node Localization Method for Wireless Sensor Networks.IEEE Wirel. Commun. Lett.11(4): 688-692 (2022)]]>https://dblp.org/rec/journals/wcl/JinZZHH22Sat, 01 Jan 2022 00:00:00 +0100Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers.https://doi.org/10.23919/ICACT53585.2022.9728951Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi: Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers.ICACT2022: 387-392]]>https://dblp.org/rec/conf/icact/JinIYT22Sat, 01 Jan 2022 00:00:00 +0100An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers.https://doi.org/10.1145/3556223.3556263Yong Jin, Zhengxu Jin, Nariyoshi Yamai, Rei Nakagawa: An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers.ICCCM2022: 263-268]]>https://dblp.org/rec/conf/icccm/JinJYN22Sat, 01 Jan 2022 00:00:00 +0100Secure Symbol-Level Precoding Designs via Intelligent Reflecting Surface.https://doi.org/10.1109/ICSPCC55723.2022.9984307Yong Jin, Chuang Liu, Zewen Li: Secure Symbol-Level Precoding Designs via Intelligent Reflecting Surface.ICSPCC2022: 1-6]]>https://dblp.org/rec/conf/icspcc/JinLL22Sat, 01 Jan 2022 00:00:00 +0100Distributed Target Tracking Method Based on Variational Bayesian with Systematic Biases.https://doi.org/10.1109/ICSPCC55723.2022.9984349Yong Jin, Qiancheng Zhang, Liu Zhou, Yue Liu: Distributed Target Tracking Method Based on Variational Bayesian with Systematic Biases.ICSPCC2022: 1-6]]>https://dblp.org/rec/conf/icspcc/JinZZL22Sat, 01 Jan 2022 00:00:00 +0100A proposal of DoH-based domain name resolution architecture including authoritative DNS servers.https://doi.org/10.1109/ITNAC55475.2022.9998349Satoru Sunahara, Yong Jin, Katsuyoshi Iida: A proposal of DoH-based domain name resolution architecture including authoritative DNS servers.ITNAC2022: 1-3]]>https://dblp.org/rec/conf/itnac/SunaharaJI22Sat, 01 Jan 2022 00:00:00 +0100Enhanced Attentive Generative Adversarial Network for Single-Image Deraining.https://doi.org/10.1109/ACCESS.2021.3073127Guoqiang Chai, Zhaoba Wang, Guodong Guo, Youxing Chen, Yong Jin, Dawei Wang, Bin Lu, Shilei Ren: Enhanced Attentive Generative Adversarial Network for Single-Image Deraining.IEEE Access9: 58390-58402 (2021)]]>https://dblp.org/rec/journals/access/ChaiWGCJWLR21Fri, 01 Jan 2021 00:00:00 +0100Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system.https://doi.org/10.1186/s13638-021-02020-3Yong Jin, Zhentao Hu, Dongdong Xie, Guodong Wu, Lin Zhou: Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system.EURASIP J. Wirel. Commun. Netw.2021(1): 144 (2021)]]>https://dblp.org/rec/journals/ejwcn/JinHXWZ21Fri, 01 Jan 2021 00:00:00 +0100Special Issue Editorial: Information Systems Research in the Age of Smart Services.https://aisel.aisnet.org/jais/vol22/iss3/10Yu-Chen Yang, Hao Ying, Yong Jin, Hsing Kenneth Cheng, Ting-Peng Liang: Special Issue Editorial: Information Systems Research in the Age of Smart Services.J. Assoc. Inf. Syst.22(3): 10 (2021)]]>https://dblp.org/rec/journals/jais/YangYJCL21Fri, 01 Jan 2021 00:00:00 +0100Tree-Based Multihop Routing Method for Energy Efficiency of Wireless Sensor Networks.https://doi.org/10.1155/2021/6671978Yong Jin, Lin Zhou, Qian Wei, Ke Bai, Wang Chen, Jifang Li: Tree-Based Multihop Routing Method for Energy Efficiency of Wireless Sensor Networks.J. Sensors2021: 6671978:1-6671978:14 (2021)]]>https://dblp.org/rec/journals/js/JinZWBCL21Fri, 01 Jan 2021 00:00:00 +0100Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network.https://doi.org/10.1016/j.sysarc.2021.102059Yong Jin, Jia Xu, Sixu Wu, Lijie Xu, Dejun Yang, Kaijian Xia: Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network.J. Syst. Archit.116: 102059 (2021)]]>https://dblp.org/rec/journals/jsa/JinXWXYX21Fri, 01 Jan 2021 00:00:00 +0100Evaluation Model of Educational Curriculum in Higher Schools Based on Deep Neural Networks.https://doi.org/10.1155/2021/6275096Yong Jin, Yiwen Yang, Baican Yang, Yunfu Zhang: Evaluation Model of Educational Curriculum in Higher Schools Based on Deep Neural Networks.Mob. Inf. Syst.2021: 6275096:1-6275096:8 (2021)]]>https://dblp.org/rec/journals/mis/JinYYZ21Fri, 01 Jan 2021 00:00:00 +0100Strong Tracking PHD Filter Based on Variational Bayesian with Inaccurate Process and Measurement Noise Covariance.https://doi.org/10.3390/s21041126Zhentao Hu, Linlin Yang, Yong Jin, Han Wang, Shibo Yang: Strong Tracking PHD Filter Based on Variational Bayesian with Inaccurate Process and Measurement Noise Covariance.Sensors21(4): 1126 (2021)]]>https://dblp.org/rec/journals/sensors/HuYJWY21Fri, 01 Jan 2021 00:00:00 +0100A Cluster-Based Energy Optimization Algorithm in Wireless Sensor Networks with Mobile Sink.https://doi.org/10.3390/s21072523Qian Wei, Ke Bai, Lin Zhou, Zhentao Hu, Yong Jin, Junwei Li: A Cluster-Based Energy Optimization Algorithm in Wireless Sensor Networks with Mobile Sink.Sensors21(7): 2523 (2021)]]>https://dblp.org/rec/journals/sensors/WeiBZHJL21Fri, 01 Jan 2021 00:00:00 +0100An Adaptive Unsupervised Feature Selection Algorithm Based on MDS for Tumor Gene Data Classification.https://doi.org/10.3390/s21113627Bo Jin, Chunling Fu, Yong Jin, Wei Yang, Shengbin Li, Guangyao Zhang, Zheng Wang: An Adaptive Unsupervised Feature Selection Algorithm Based on MDS for Tumor Gene Data Classification.Sensors21(11): 3627 (2021)]]>https://dblp.org/rec/journals/sensors/JinFJYLZW21Fri, 01 Jan 2021 00:00:00 +0100Learning Transferable Driven and Drone Assisted Sustainable and Robust Regional Disease Surveillance for Smart Healthcare.https://doi.org/10.1109/TCBB.2020.3017041Yong Jin, Zhenjiang Qian, Shengrong Gong, Weiyong Yang: Learning Transferable Driven and Drone Assisted Sustainable and Robust Regional Disease Surveillance for Smart Healthcare.IEEE ACM Trans. Comput. Biol. Bioinform.18(1): 114-125 (2021)]]>https://dblp.org/rec/journals/tcbb/JinQGY21Fri, 01 Jan 2021 00:00:00 +0100Enabling the Wireless Charging via Bus Network: Route Scheduling for Electric Vehicles.https://doi.org/10.1109/TITS.2020.3023695Yong Jin, Jia Xu, Sixu Wu, Lijie Xu, Dejun Yang: Enabling the Wireless Charging via Bus Network: Route Scheduling for Electric Vehicles.IEEE Trans. Intell. Transp. Syst.22(3): 1827-1839 (2021)]]>https://dblp.org/rec/journals/tits/Jin0WXY21Fri, 01 Jan 2021 00:00:00 +0100An Adaptive BP Neural Network Model for Teaching Quality Evaluation in Colleges and Universities.https://doi.org/10.1155/2021/4936873Yong Jin, Yiwen Yang, Baican Yang, Yunfu Zhang: An Adaptive BP Neural Network Model for Teaching Quality Evaluation in Colleges and Universities.Wirel. Commun. Mob. Comput.2021: 4936873:1-4936873:7 (2021)]]>https://dblp.org/rec/journals/wicomm/JinYYZ21Fri, 01 Jan 2021 00:00:00 +0100A Stochastic Beamforming Algorithm for Wireless Sensor Network with Multiple Relays and Multiple Eavesdroppers.https://doi.org/10.1007/s11277-020-07778-1Zhentao Hu, Yong Jin, Haijiang Liu: A Stochastic Beamforming Algorithm for Wireless Sensor Network with Multiple Relays and Multiple Eavesdroppers.Wirel. Pers. Commun.116(3): 2035-2048 (2021)]]>https://dblp.org/rec/journals/wpc/HuJL21Fri, 01 Jan 2021 00:00:00 +0100Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation.https://doi.org/10.1145/3481646.3481654Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation.ICCBDC2021: 46-51]]>https://dblp.org/rec/conf/iccbdc/JinTY21Fri, 01 Jan 2021 00:00:00 +0100Weighted Hierarchy Mechanism over BERT for Long Text Classification.https://doi.org/10.1007/978-3-030-78609-0_48Yong Jin, Qisi Zhu, Xuan Deng, Linli Hu: Weighted Hierarchy Mechanism over BERT for Long Text Classification.ICAIS (1)2021: 566-574]]>https://dblp.org/rec/conf/icccsec/JinZDH21Fri, 01 Jan 2021 00:00:00 +0100Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification.https://doi.org/10.1145/3478472.3478481Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification.ICHMI2021: 47-56]]>https://dblp.org/rec/conf/ichmi/JinTY21Fri, 01 Jan 2021 00:00:00 +0100Tumor classification by filtering feature selection based on genetic data similarity.https://doi.org/10.1109/ICSPCC52875.2021.9564843Shengbin Li, Chunling Fu, Yong Jin: Tumor classification by filtering feature selection based on genetic data similarity.ICSPCC2021: 1-5]]>https://dblp.org/rec/conf/icspcc/LiFJ21Fri, 01 Jan 2021 00:00:00 +0100Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.https://doi.org/10.1007/978-3-030-91356-4_13Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai: Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.ISC2021: 238-256]]>https://dblp.org/rec/conf/isw/MitsuhashiSJIST21Fri, 01 Jan 2021 00:00:00 +0100The Measurement Method for the Size of the Hole on the Part Surface Based on Grating Image Processing.https://doi.org/10.1109/ACCESS.2020.2969228Yong Jin, Yimin Chang, Jiaying Wang, Maozhen Li, Liheng Ren, Youxing Chen: The Measurement Method for the Size of the Hole on the Part Surface Based on Grating Image Processing.IEEE Access8: 29159-29168 (2020)]]>https://dblp.org/rec/journals/access/JinCWLRC20Wed, 01 Jan 2020 00:00:00 +0100Application and Performance Optimization of MapReduce Model in Image Segmentation.https://doi.org/10.1109/ACCESS.2019.2963343Maozhen Li, Lu Meng, Jiaying Wang, Yong Jin, Binyu Hu, Youxing Chen: Application and Performance Optimization of MapReduce Model in Image Segmentation.IEEE Access8: 31835-31844 (2020)]]>https://dblp.org/rec/journals/access/LiMWJHC20Wed, 01 Jan 2020 00:00:00 +0100UAV Cluster-Based Video Surveillance System Optimization in Heterogeneous Communication of Smart Cities.https://doi.org/10.1109/ACCESS.2020.2981647Yong Jin, Zhenjiang Qian, Weiyong Yang: UAV Cluster-Based Video Surveillance System Optimization in Heterogeneous Communication of Smart Cities.IEEE Access8: 55654-55664 (2020)]]>https://dblp.org/rec/journals/access/JinQY20Wed, 01 Jan 2020 00:00:00 +0100Recurrent Attention Dense Network for Single Image De-Raining.https://doi.org/10.1109/ACCESS.2020.3003126Guoqiang Chai, Zhao-Ba Wang, Guodong Guo, Youxing Chen, Yong Jin, Wei Wang, Xia Zhao: Recurrent Attention Dense Network for Single Image De-Raining.IEEE Access8: 111278-111288 (2020)]]>https://dblp.org/rec/journals/access/ChaiWGCJWZ20Wed, 01 Jan 2020 00:00:00 +0100Weighted Conflict Evidence Combination Method Based on Hellinger Distance and the Belief Entropy.https://doi.org/10.1109/ACCESS.2020.3044605Junwei Li, Baolin Xie, Yong Jin, Zhentao Hu, Lin Zhou: Weighted Conflict Evidence Combination Method Based on Hellinger Distance and the Belief Entropy.IEEE Access8: 225507-225521 (2020)]]>https://dblp.org/rec/journals/access/LiXJHZ20Wed, 01 Jan 2020 00:00:00 +0100Special Issue on AI-Driven Smart Networking and Communication for Personal Internet of Things: Part II.https://doi.org/10.1007/s10776-020-00486-4Yong Jin, Honghao Gao, Tao Hu, Xinrong Li: Special Issue on AI-Driven Smart Networking and Communication for Personal Internet of Things: Part II.Int. J. Wirel. Inf. Networks27(2): 207-208 (2020)]]>https://dblp.org/rec/journals/ijwin/JinGHL20Wed, 01 Jan 2020 00:00:00 +0100Editorial for the special issue on "intelligent agent distributed signal processing for IoT".https://doi.org/10.1007/s12652-019-01288-0Yong Jin, Yongjun Liu, Wen Si: Editorial for the special issue on "intelligent agent distributed signal processing for IoT".J. Ambient Intell. Humaniz. Comput.11(2): 447-449 (2020)]]>https://dblp.org/rec/journals/jaihc/JinLS20Wed, 01 Jan 2020 00:00:00 +0100Recursive modified dense network for single-image deraining.https://doi.org/10.1117/1.JEI.29.3.033006Guoqiang Chai, Zhaoba Wang, Guodong Guo, Youxing Chen, Yong Jin, Wei Wang, Xia Zhao: Recursive modified dense network for single-image deraining.J. Electronic Imaging29(3): 033006 (2020)]]>https://dblp.org/rec/journals/jei/ChaiWGCJWZ20Wed, 01 Jan 2020 00:00:00 +0100NS record History Based Abnormal DNS traffic Detection Considering Adaptive Botnet Communication Blocking.https://doi.org/10.2197/ipsjjip.28.112Hikaru Ichise, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai: NS record History Based Abnormal DNS traffic Detection Considering Adaptive Botnet Communication Blocking.J. Inf. Process.28: 112-122 (2020)]]>https://dblp.org/rec/journals/jip/IchiseJIT20Wed, 01 Jan 2020 00:00:00 +0100Special issue on multimedia fog/edge computing systems.https://doi.org/10.1007/s00530-019-00643-7Yong Jin, Daniele D'Agostino, Nadjib Achir, James Nightingale, Jiacun Wang: Special issue on multimedia fog/edge computing systems.Multim. Syst.26(1): 1-2 (2020)]]>https://dblp.org/rec/journals/mms/JinDANW20Wed, 01 Jan 2020 00:00:00 +0100Robust Visual Tracking Based on Adaptive Multi-Feature Fusion Using the Tracking Reliability Criterion.https://doi.org/10.3390/s20247165Lin Zhou, Han Wang, Yong Jin, Zhentao Hu, Qian Wei, Junwei Li, Jifang Li: Robust Visual Tracking Based on Adaptive Multi-Feature Fusion Using the Tracking Reliability Criterion.Sensors20(24): 7165 (2020)]]>https://dblp.org/rec/journals/sensors/ZhouWJHWLL20Wed, 01 Jan 2020 00:00:00 +0100Cross-Domain Brain CT Image Smart Segmentation via Shared Hidden Space Transfer FCM Clustering.https://doi.org/10.1145/3357233Kaijian Xia, Hongsheng Yin, Yong Jin, Shi Qiu, Hongru Zhao: Cross-Domain Brain CT Image Smart Segmentation via Shared Hidden Space Transfer FCM Clustering.ACM Trans. Multim. Comput. Commun. Appl.16(2s): 61:1-61:21 (2020)]]>https://dblp.org/rec/journals/tomccap/XiaYJQZ20Wed, 01 Jan 2020 00:00:00 +0100Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses.https://doi.org/10.1109/CSCloud-EdgeCom49738.2020.00023Yuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida, Yoshiaki Takai: Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses.CSCloud/EdgeCom2020: 82-87]]>https://dblp.org/rec/conf/cscloud/IuchiJIIT20Wed, 01 Jan 2020 00:00:00 +0100Knowledge Graph Construction of Personal Relationships.https://doi.org/10.1007/978-3-030-57884-8_40Yong Jin, Qiao Jin, Xusheng Yang: Knowledge Graph Construction of Personal Relationships.ICAIS (1)2020: 455-466]]>https://dblp.org/rec/conf/icccsec/JinJY20Wed, 01 Jan 2020 00:00:00 +0100A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models.https://doi.org/10.5220/0009099606390646Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi: A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models.ICISSP2020: 639-646]]>https://dblp.org/rec/conf/icissp/0002MMTJK20Wed, 01 Jan 2020 00:00:00 +0100Relays Selection Algorithm of Collaborative Communication Network on Condition of Channel Statistic Information Error.https://doi.org/10.1109/ICSPCC50002.2020.9259542Yong Zhang, Junwei Li, Kunlin Song, Yong Jin: Relays Selection Algorithm of Collaborative Communication Network on Condition of Channel Statistic Information Error.ICSPCC2020: 1-6]]>https://dblp.org/rec/conf/icspcc/ZhangLSJ20Wed, 01 Jan 2020 00:00:00 +0100A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone.https://doi.org/10.1109/ISNCC49221.2020.9297211Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone.ISNCC2020: 1-6]]>https://dblp.org/rec/conf/isncc/JinTY20Wed, 01 Jan 2020 00:00:00 +0100LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint.https://doi.org/10.1049/iet-wss.2018.5216Lin Zhou, Yongjun Fang, Qian Wei, Yong Jin, Zhentao Hu: LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint.IET Wirel. Sens. Syst.9(6): 347-357 (2019)]]>https://dblp.org/rec/journals/iet-wss/ZhouFWJH19Tue, 01 Jan 2019 00:00:00 +0100A Fuzzy Support Vector Machine-Enhanced Convolutional Neural Network for Recognition of Glass Defects.https://doi.org/10.1007/s40815-019-00697-9Yong Jin, Dan-dan Zhang, Maozhen Li, Zhaoba Wang, Youxing Chen: A Fuzzy Support Vector Machine-Enhanced Convolutional Neural Network for Recognition of Glass Defects.Int. J. Fuzzy Syst.21(6): 1870-1881 (2019)]]>https://dblp.org/rec/journals/ijfs/JinZLWC19Tue, 01 Jan 2019 00:00:00 +0100Special Issue on AI-Driven Smart Networking and Communication for Personal Internet of Things, Part I.https://doi.org/10.1007/s10776-019-00445-8Yong Jin, Honghao Gao, Tao Hu, Xinrong Li: Special Issue on AI-Driven Smart Networking and Communication for Personal Internet of Things, Part I.Int. J. Wirel. Inf. Networks26(3): 131-132 (2019)]]>https://dblp.org/rec/journals/ijwin/JinGHL19Tue, 01 Jan 2019 00:00:00 +0100Low-Cost and Active Control of Radiation of Wearable Medical Health Device for Wireless Body Area Network.https://doi.org/10.1007/s10916-019-1254-0Yong Jin: Low-Cost and Active Control of Radiation of Wearable Medical Health Device for Wireless Body Area Network.J. Medical Syst.43(5): 137:1-137:11 (2019)]]>https://dblp.org/rec/journals/jms/Jin19Tue, 01 Jan 2019 00:00:00 +0100基于SDN的数据中心网络多路径流量调度算法 (SDN-based Multipath Traffic Scheduling Algorithm for Data Center Network).https://doi.org/10.11896/j.issn.1002-137X.2019.06.012Yong Jin, Yixing Liu, Xinxin Wang: 基于SDN的数据中心网络多路径流量调度算法 (SDN-based Multipath Traffic Scheduling Algorithm for Data Center Network).计算机科学46(6): 90-94 (2019)]]>https://dblp.org/rec/journals/jsjkx/JinLW19Tue, 01 Jan 2019 00:00:00 +0100A real-time multimedia streaming transmission control mechanism based on edge cloud computing and opportunistic approximation optimization.https://doi.org/10.1007/s11042-018-6680-3Yong Jin, Zhenjiang Qian, Gaofei Sun: A real-time multimedia streaming transmission control mechanism based on edge cloud computing and opportunistic approximation optimization.Multim. Tools Appl.78(7): 8911-8926 (2019)]]>https://dblp.org/rec/journals/mta/JinQS19Tue, 01 Jan 2019 00:00:00 +0100Guest editorials: Special issue on fog/edge networking for multimedia applications.https://doi.org/10.1007/s12083-019-00812-5Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale: Guest editorials: Special issue on fog/edge networking for multimedia applications.Peer-to-Peer Netw. Appl.12(6): 1477-1479 (2019)]]>https://dblp.org/rec/journals/ppna/JinSDAN19Tue, 01 Jan 2019 00:00:00 +0100Data collection scheme with minimum cost and location of emotional recognition edge devices.https://doi.org/10.1007/s00779-019-01217-0Yong Jin, Zhenjiang Qian, Shunjiang Chen: Data collection scheme with minimum cost and location of emotional recognition edge devices.Pers. Ubiquitous Comput.23(3-4): 595-606 (2019)]]>https://dblp.org/rec/journals/puc/JinQC19Tue, 01 Jan 2019 00:00:00 +0100Advanced Machine Learning for Gesture Learning and Recognition Based on Intelligent Big Data of Heterogeneous Sensors.https://doi.org/10.3390/sym11070929Jisun Park, Yong Jin, Seoungjae Cho, Yunsick Sung, Kyungeun Cho: Advanced Machine Learning for Gesture Learning and Recognition Based on Intelligent Big Data of Heterogeneous Sensors.Symmetry11(7): 929 (2019)]]>https://dblp.org/rec/journals/symmetry/ParkJCSC19Tue, 01 Jan 2019 00:00:00 +0100Genetic algorithm-based adaptive weight decision method for motion estimation framework.https://doi.org/10.1007/s11227-018-2247-3Jeongsook Chae, Yong Jin, Mingyun Wen, Weiqiang Zhang, Yunsick Sung, Kyungeun Cho: Genetic algorithm-based adaptive weight decision method for motion estimation framework.J. Supercomput.75(4): 1909-1921 (2019)]]>https://dblp.org/rec/journals/tjs/ChaeJWZSC19Tue, 01 Jan 2019 00:00:00 +0100Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification.https://doi.org/10.1109/BigData47090.2019.9006365Yong Jin, Masahiko Tomoishi, Satoshi Matsuura: Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification.IEEE BigData2019: 6084-6085]]>https://dblp.org/rec/conf/bigdataconf/JinTM19Tue, 01 Jan 2019 00:00:00 +0100A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation.https://doi.org/10.1109/CCNC.2019.8651860Yong Jin, Masahiko Tomoishi, Kenji Fujikawa, Ved P. Kafle: A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation.CCNC2019: 1-2]]>https://dblp.org/rec/conf/ccnc/JinTFK19Tue, 01 Jan 2019 00:00:00 +0100Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System.https://doi.org/10.1109/COMPSAC.2019.10286Yong Jin, Masahiko Tomoishi: Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System.COMPSAC (2)2019: 676-681]]>https://dblp.org/rec/conf/compsac/JinT19Tue, 01 Jan 2019 00:00:00 +0100A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes.https://doi.org/10.1109/ITNAC46935.2019.9078020Yong Jin, Masahiko Tomoishi: A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes.ITNAC2019: 1-7]]>https://dblp.org/rec/conf/itnac/JinT19Tue, 01 Jan 2019 00:00:00 +0100A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress.https://doi.org/10.1109/NCA.2019.8935025Yong Jin, Masahiko Tomoishi, Satoshi Matsuura: A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress.NCA2019: 1-3]]>https://dblp.org/rec/conf/nca/JinTM19Tue, 01 Jan 2019 00:00:00 +0100Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network.https://doi.org/10.1109/PACRIM47961.2019.8985052Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network.PACRIM2019: 1-6]]>https://dblp.org/rec/conf/pacrim/JinTY19Tue, 01 Jan 2019 00:00:00 +0100Compressive tracking combined with sample weights and adaptive learning factor.https://doi.org/10.1002/cpe.4398Yong Jin, Hong-ying Li, Dan-dan Zhang, Jing Wu, Maozhen Li: Compressive tracking combined with sample weights and adaptive learning factor.Concurr. Comput. Pract. Exp.30(23) (2018)]]>https://dblp.org/rec/journals/concurrency/JinLZWL18Mon, 01 Jan 2018 00:00:00 +0100Parallelizing Hartley transform with Hadoop for fast detection of glass defects.https://doi.org/10.1002/cpe.4499Maozhen Li, Hanyuan Zhang, Yong Jin, Zhaoba Wang, Guodong Guo: Parallelizing Hartley transform with Hadoop for fast detection of glass defects.Concurr. Comput. Pract. Exp.30(23) (2018)]]>https://dblp.org/rec/journals/concurrency/LiZJWG18Mon, 01 Jan 2018 00:00:00 +0100Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection.https://doi.org/10.1587/transcom.2017ITP0009Hikaru Ichise, Yong Jin, Katsuyoshi Iida: Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection.IEICE Trans. Commun.101-B(1): 70-79 (2018)]]>https://dblp.org/rec/journals/ieicet/IchiseJI18Mon, 01 Jan 2018 00:00:00 +0100A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices.https://doi.org/10.1587/transinf.2017ICP0017Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi: A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices.IEICE Trans. Inf. Syst.101-D(11): 2612-2621 (2018)]]>https://dblp.org/rec/journals/ieicet/JinTMK18Mon, 01 Jan 2018 00:00:00 +0100Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution.https://doi.org/10.1587/transinf.2017ICP0014Hiroya Ikarashi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Kiyohiko Okayama: Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution.IEICE Trans. Inf. Syst.101-D(11): 2633-2643 (2018)]]>https://dblp.org/rec/journals/ieicet/IkarashiJYKO18Mon, 01 Jan 2018 00:00:00 +0100Anti-occlusion tracking algorithm of video target based on prediction and re-matching strategy.https://doi.org/10.1016/j.jvcir.2018.10.019Zhentao Hu, Lin Zhou, Ya-nan Yang, Xianxing Liu, Yong Jin: Anti-occlusion tracking algorithm of video target based on prediction and re-matching strategy.J. Vis. Commun. Image Represent.57: 176-182 (2018)]]>https://dblp.org/rec/journals/jvcir/HuZYLJ18Mon, 01 Jan 2018 00:00:00 +0100Relay selection based on social relationship prediction and information leakage reduction for mobile social networks.https://doi.org/10.3934/mfc.2018018Xiaoshuang Xing, Gaofei Sun, Yong Jin, Wenyi Tang, Xiuzhen Cheng: Relay selection based on social relationship prediction and information leakage reduction for mobile social networks.Math. Found. Comput.1(4): 369-382 (2018)]]>https://dblp.org/rec/journals/mfc/XingSJTC18Mon, 01 Jan 2018 00:00:00 +0100Genetic Algorithm-Based Motion Estimation Method using Orientations and EMGs for Robot Controls.https://doi.org/10.3390/s18010183Jeongsook Chae, Yong Jin, Yunsick Sung, Kyungeun Cho: Genetic Algorithm-Based Motion Estimation Method using Orientations and EMGs for Robot Controls.Sensors18(1): 183 (2018)]]>https://dblp.org/rec/journals/sensors/ChaeJSC18Mon, 01 Jan 2018 00:00:00 +0100Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History.https://doi.org/10.23919/APSIPA.2018.8659739Hikaru Ichise, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai: Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History.APSIPA2018: 1586-1590]]>https://dblp.org/rec/conf/apsipa/IchiseJIT18Mon, 01 Jan 2018 00:00:00 +0100Message from the ADMNET 2018 Workshop Organizers.https://doi.org/10.1109/COMPSAC.2018.10227Takashi Yamanoue, Hiroki Kashiwazaki, Yong Jin, Ruediger Gad: Message from the ADMNET 2018 Workshop Organizers.COMPSAC (2)2018: 191-192]]>https://dblp.org/rec/conf/compsac/YamanoueKJG18Mon, 01 Jan 2018 00:00:00 +0100A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature.https://doi.org/10.1109/CW.2018.00070Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi: A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature.CW2018: 351-356]]>https://dblp.org/rec/conf/cw/JinKYKT18Mon, 01 Jan 2018 00:00:00 +0100A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks.https://doi.org/10.1109/ICCNC.2018.8390376Yong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi: A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks.ICNC2018: 1-6]]>https://dblp.org/rec/conf/iccnc/JinTMK18Mon, 01 Jan 2018 00:00:00 +0100A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation.https://doi.org/10.1109/ICTC.2018.8539727Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation.ICTC2018: 148-153]]>https://dblp.org/rec/conf/ictc/JinTY18Mon, 01 Jan 2018 00:00:00 +0100Conjugate gradient neural network-based online recognition of glass defects.https://doi.org/10.1002/cpe.3768Yong Jin, Jialiang Weng, Zhaoba Wang: Conjugate gradient neural network-based online recognition of glass defects.Concurr. Comput. Pract. Exp.29(3) (2017)]]>https://dblp.org/rec/journals/concurrency/JinWW17Sun, 01 Jan 2017 00:00:00 +0100A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout.https://doi.org/10.1587/transinf.2016ICP0028Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi: A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout.IEICE Trans. Inf. Syst.100-D(8): 1751-1761 (2017)]]>https://dblp.org/rec/journals/ieicet/JinKYKT17Sun, 01 Jan 2017 00:00:00 +0100Joint estimation of state and system biases in non-linear system.https://doi.org/10.1049/iet-spr.2015.0068Lin Zhou, Xianxing Liu, Zhentao Hu, Yong Jin, Wentao Shi: Joint estimation of state and system biases in non-linear system.IET Signal Process.11(1): 10-16 (2017)]]>https://dblp.org/rec/journals/iet-spr/ZhouLHJS17Sun, 01 Jan 2017 00:00:00 +0100Opportunistic Cooperative Sensing for Indoor Complex Environment Monitoring.https://www.online-journals.org/index.php/i-joe/article/view/6709Yong Jin, Zhenjiang Qian, Xiaoshuang Xing, Lu Shen: Opportunistic Cooperative Sensing for Indoor Complex Environment Monitoring.Int. J. Online Eng.13(8): 4-17 (2017)]]>https://dblp.org/rec/journals/ijoe/JinQXS17Sun, 01 Jan 2017 00:00:00 +0100Relay Selection Algorithm for Cognitive Relay Network.https://doi.org/10.1007/s11277-017-4472-0Yong Jin, Yunshan Hou, Zhentao Hu, Xianxing Liu: Relay Selection Algorithm for Cognitive Relay Network.Wirel. Pers. Commun.96(4): 6183-6195 (2017)]]>https://dblp.org/rec/journals/wpc/JinHHL17Sun, 01 Jan 2017 00:00:00 +0100Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading.https://doi.org/10.1109/COMPSAC.2017.78Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi: Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading.COMPSAC (2)2017: 37-42]]>https://dblp.org/rec/conf/compsac/KakoiJYKT17Sun, 01 Jan 2017 00:00:00 +0100A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS.https://doi.org/10.1109/COMPSAC.2017.33Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS.COMPSAC (2)2017: 282-283]]>https://dblp.org/rec/conf/compsac/JinTY17Sun, 01 Jan 2017 00:00:00 +0100An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations.https://doi.org/10.1109/COMPSAC.2017.56Yong Jin, Masahiko Tomoishi, Satoshi Matsuura: An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations.COMPSAC (1)2017: 608-613]]>https://dblp.org/rec/conf/compsac/JinTM17Sun, 01 Jan 2017 00:00:00 +0100Highly efficient representation of reconfigurable code based on a radio virtual machine: Optimization to any target platform.https://doi.org/10.23919/EUSIPCO.2017.8081336Vladimir Ivanov, Yong Jin, Seungwon Choi, Giuseppe Destino, Markus Mueck, Valerio Frascolla: Highly efficient representation of reconfigurable code based on a radio virtual machine: Optimization to any target platform.EUSIPCO2017: 893-897]]>https://dblp.org/rec/conf/eusipco/0002JCDMF17Sun, 01 Jan 2017 00:00:00 +0100Adaptive automotive communications solutions of 10 years lifetime enabled by ETSI RRS software reconfiguration technology.https://doi.org/10.23919/EUSIPCO.2017.8081338Yong Jin, Heungseop Ahn, Kyunghoon Kim, Seungwon Choi, Markus Mueck, Valerio Frascolla, Thomas Haustein: Adaptive automotive communications solutions of 10 years lifetime enabled by ETSI RRS software reconfiguration technology.EUSIPCO2017: 903-906]]>https://dblp.org/rec/conf/eusipco/JinAKCMFH17Sun, 01 Jan 2017 00:00:00 +0100Radio Equipment Directive - A Novel Software Reconfiguration Framework.https://doi.org/10.1109/GLOCOMW.2017.8269208Markus Mueck, Seungwon Choi, Paul Bender, Vladimir Ivanov, Yong Jin, Heungseop Ahn, Kyunghoon Kim, Eryk Dutkiewicz: Radio Equipment Directive - A Novel Software Reconfiguration Framework.GLOBECOM Workshops2017: 1-5]]>https://dblp.org/rec/conf/globecom/MueckCB0JAKD17Sun, 01 Jan 2017 00:00:00 +0100Research and implementation of acceleration recorder based MSV3000.https://doi.org/10.1109/ICSPCC.2017.8242425Shihao Yao, Jifang Li, Yong Jin, Yanan Yang, Jie Liu: Research and implementation of acceleration recorder based MSV3000.ICSPCC2017: 1-4]]>https://dblp.org/rec/conf/icspcc/YaoLJYL17Sun, 01 Jan 2017 00:00:00 +0100Efficient detection of suspicious DNS traffic by resolver separation per application program.https://doi.org/10.1109/ICTC.2017.8190948Yong Jin, Kunitaka Kakoi, Masahiko Tomoishi, Nariyoshi Yamai: Efficient detection of suspicious DNS traffic by resolver separation per application program.ICTC2017: 87-92]]>https://dblp.org/rec/conf/ictc/JinKTY17Sun, 01 Jan 2017 00:00:00 +0100Incorporating Positional Information into Deep Belief Networks for Sentiment Classification.https://doi.org/10.1007/978-3-319-62701-4_1Yong Jin, Harry Zhang, Donglei Du: Incorporating Positional Information into Deep Belief Networks for Sentiment Classification.ICDM2017: 1-15]]>https://dblp.org/rec/conf/incdm/JinZD17Sun, 01 Jan 2017 00:00:00 +0100High Availability Evaluation Utilizing Service Level Agreement.https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.129Huahui Lyu, Yuning Xiao, Ruihong Yan, Yong Jin, Ruimin Shen, Bin Sheng: High Availability Evaluation Utilizing Service Level Agreement.iThings/GreenCom/CPSCom/SmartData2017: 841-844]]>https://dblp.org/rec/conf/ithings/LyuXYJSS17Sun, 01 Jan 2017 00:00:00 +0100Failure Resilient Routing via IoT Networks.https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.130Kai Fan, Jiapeng Lu, Dazhen Sun, Yong Jin, Ruimin Shen, Bin Sheng: Failure Resilient Routing via IoT Networks.iThings/GreenCom/CPSCom/SmartData2017: 845-850]]>https://dblp.org/rec/conf/ithings/FanLSJSS17Sun, 01 Jan 2017 00:00:00 +0100Implementation of a Non-Codebook Based MU-MIMO System for TDD LTE-Advanced.https://doi.org/10.1109/VTCSpring.2017.8108514Daejin Kim, Sangwook Han, Yong Jin, Heungseop Ahn, Seungwon Choi: Implementation of a Non-Codebook Based MU-MIMO System for TDD LTE-Advanced.VTC Spring2017: 1-5]]>https://dblp.org/rec/conf/vtc/KimHJAC17Sun, 01 Jan 2017 00:00:00 +0100Opportunity cooperative embedded platform and control mechanism based on selectivity of time and frequency domain.https://doi.org/10.1186/s13639-016-0028-8Yong Jin, Huan Dai, Canghai Sui, Anqi Liu, Ping Xu: Opportunity cooperative embedded platform and control mechanism based on selectivity of time and frequency domain.EURASIP J. Embed. Syst.2016: 5 (2016)]]>https://dblp.org/rec/journals/ejes/JinDSLX16Fri, 01 Jan 2016 00:00:00 +0100Design and Implementation of ETSI-Standard Reconfigurable Mobile Device for Heterogeneous Network.https://doi.org/10.1587/transcom.2015EBP3369Yong Jin, Chiyoung Ahn, Seungwon Choi, Markus Mueck, Vladimir Ivanov, Tapan K. Sarkar: Design and Implementation of ETSI-Standard Reconfigurable Mobile Device for Heterogeneous Network.IEICE Trans. Commun.99-B(8): 1874-1883 (2016)]]>https://dblp.org/rec/journals/ieicet/JinACMIS16Fri, 01 Jan 2016 00:00:00 +0100Lightweight QoE Driven and Invulnerability Guarantee Opportunistic Control Scheme for Wireless Sensor Networks.https://www.online-journals.org/index.php/i-joe/article/view/5726Yong Jin, Jian Cai, Huan Dai, Kaijian Xia, Ping Xu: Lightweight QoE Driven and Invulnerability Guarantee Opportunistic Control Scheme for Wireless Sensor Networks.Int. J. Online Eng.12(8): 19-24 (2016)]]>https://dblp.org/rec/journals/ijoe/JinCDXX16Fri, 01 Jan 2016 00:00:00 +0100Cognition Cloud Model for Next Generation Mobile Internet: Communication, Control, and Application.https://doi.org/10.1155/2016/7578298Yong Jin, Chaobo Yan, James Nightingale: Cognition Cloud Model for Next Generation Mobile Internet: Communication, Control, and Application.J. Electr. Comput. Eng.2016: 7578298:1-7578298:2 (2016)]]>https://dblp.org/rec/journals/jece/JinYN16Fri, 01 Jan 2016 00:00:00 +0100Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks.http://bit.kuas.edu.tw/~jihmsp/2016/vol7/JIH-MSP-2016-02-004.pdfYong Jin, Ruigang Li: Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks.J. Inf. Hiding Multim. Signal Process.7(2): 254-265 (2016)]]>https://dblp.org/rec/journals/jihmsp/JinL16Fri, 01 Jan 2016 00:00:00 +0100ETSI-Standard Reconfigurable Mobile Device for Supporting the Licensed Shared Access.https://doi.org/10.1155/2016/8035876Kyunghoon Kim, Yong Jin, Donghyun Kum, Seungwon Choi, Markus Mueck, Vladimir Ivanov: ETSI-Standard Reconfigurable Mobile Device for Supporting the Licensed Shared Access.Mob. Inf. Syst.2016: 8035876:1-8035876:11 (2016)]]>https://dblp.org/rec/journals/mis/KimJKCMI16Fri, 01 Jan 2016 00:00:00 +0100Hadoop Performance Modeling for Job Estimation and Resource Provisioning.https://doi.org/10.1109/TPDS.2015.2405552Mukhtaj Khan, Yong Jin, Maozhen Li, Yang Xiang, Changjun Jiang: Hadoop Performance Modeling for Job Estimation and Resource Provisioning.IEEE Trans. Parallel Distributed Syst.27(2): 441-454 (2016)]]>https://dblp.org/rec/journals/tpds/KhanJLXJ16Fri, 01 Jan 2016 00:00:00 +0100Gaussian Neuron in Deep Belief Network for Sentiment Prediction.https://doi.org/10.1007/978-3-319-34111-8_6Yong Jin, Donglei Du, Harry Zhang: Gaussian Neuron in Deep Belief Network for Sentiment Prediction.Canadian AI2016: 46-51]]>https://dblp.org/rec/conf/ai/JinDZ16Fri, 01 Jan 2016 00:00:00 +0100Extracting Discriminative Keyphrases with Learned Semantic Hierarchies.https://aclanthology.org/C16-1089/Yunli Wang, Yong Jin, Xiaodan Zhu, Cyril Goutte: Extracting Discriminative Keyphrases with Learned Semantic Hierarchies.COLING2016: 932-942]]>https://dblp.org/rec/conf/coling/WangJZG16Fri, 01 Jan 2016 00:00:00 +0100Message from the ADMNET Workshop Organizers.https://doi.org/10.1109/COMPSAC.2016.270Takashi Yamanoue, Hiroki Kashiwazaki, Seigo Kishiba, Yong Jin: Message from the ADMNET Workshop Organizers.COMPSAC Workshops2016: 1]]>https://dblp.org/rec/conf/compsac/YamanoueKKJ16Fri, 01 Jan 2016 00:00:00 +0100Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNS.https://doi.org/10.1109/COMPSAC.2016.10Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta: Design and Implementation of Secure Prefetch Mechanism for Multi-step Name Resolution in DNS.COMPSAC Workshops2016: 2-7]]>https://dblp.org/rec/conf/compsac/JinFHO16Fri, 01 Jan 2016 00:00:00 +0100Design and Implementation of a Client Based DNSSEC Validation and Alert System.https://doi.org/10.1109/COMPSAC.2016.91Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi: Design and Implementation of a Client Based DNSSEC Validation and Alert System.COMPSAC Workshops2016: 8-13]]>https://dblp.org/rec/conf/compsac/KakoiJYKT16Fri, 01 Jan 2016 00:00:00 +0100Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information.https://doi.org/10.1109/COMPSAC.2016.93Yong Jin, Masahiko Tomoishi, Satoshi Matsuura: Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information.COMPSAC2016: 459-464]]>https://dblp.org/rec/conf/compsac/JinTM16Fri, 01 Jan 2016 00:00:00 +0100Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection.https://doi.org/10.1109/ICCCN.2016.7568518Yong Jin, Masahiko Tomoishi, Satoshi Matsuura: Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection.ICCCN2016: 1-6]]>https://dblp.org/rec/conf/icccn/JinTM16Fri, 01 Jan 2016 00:00:00 +0100Random inspection evaluation of Shanghai graduate dissertation based on Bayesian decision tree.https://doi.org/10.1109/ICCSE.2016.7581631Zhao Xu, Yong Jin, Shardrom Johnson, Weishan Gao, Hui Miao, Qin Wei: Random inspection evaluation of Shanghai graduate dissertation based on Bayesian decision tree.ICCSE2016: 501-504]]>https://dblp.org/rec/conf/iccse2/XuJJGMW16Fri, 01 Jan 2016 00:00:00 +0100Improving Deep Belief Networks via Delta Rule for Sentiment Classification.https://doi.org/10.1109/ICTAI.2016.0069Yong Jin, Harry Zhang, Donglei Du: Improving Deep Belief Networks via Delta Rule for Sentiment Classification.ICTAI2016: 410-414]]>https://dblp.org/rec/conf/ictai/JinZD16Fri, 01 Jan 2016 00:00:00 +0100An advanced client based DNSSEC validation and preliminary evaluations toward realization.https://doi.org/10.1109/ICTC.2016.7763463Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai: An advanced client based DNSSEC validation and preliminary evaluations toward realization.ICTC2016: 178-183]]>https://dblp.org/rec/conf/ictc/JinTY16Fri, 01 Jan 2016 00:00:00 +0100ETSI reconflgurable radio system - Standard interfaces for radio reconfiguration.https://doi.org/10.1109/ICTC.2016.7763543Heungseop Ahn, Yong Jin, Seungwon Choi: ETSI reconflgurable radio system - Standard interfaces for radio reconfiguration.ICTC2016: 604-606]]>https://dblp.org/rec/conf/ictc/AhnJC16Fri, 01 Jan 2016 00:00:00 +0100ETSI reconfigurable radio system - Standard architecture and radio application.https://doi.org/10.1109/ICTC.2016.7763376Yong Jin, Ildo Jung, Kyunghoon Kim, Seungwon Choi: ETSI reconfigurable radio system - Standard architecture and radio application.ICTC2016: 1094-1097]]>https://dblp.org/rec/conf/ictc/JinJKC16Fri, 01 Jan 2016 00:00:00 +0100The ETSI standard architecture, related interfaces, and reconfiguration process for reconfigurable mobile devices.https://doi.org/10.1109/MCOM.2015.7263344Yong Jin, Kyunghoon Kim, Donghyun Kum, Seungwon Choi, Vladimir Ivanov: The ETSI standard architecture, related interfaces, and reconfiguration process for reconfigurable mobile devices.IEEE Commun. Mag.53(9): 38-46 (2015)]]>https://dblp.org/rec/journals/cm/JinKKCI15Thu, 01 Jan 2015 00:00:00 +0100QoS guarantee protocol based on combination of opportunistic dynamic cloud service and cooperative multimedia stream for wireless sensor networks.https://doi.org/10.1186/s13638-015-0407-1Yong Jin, Ruigang Li, Huan Dai, Junchao Zhang: QoS guarantee protocol based on combination of opportunistic dynamic cloud service and cooperative multimedia stream for wireless sensor networks.EURASIP J. Wirel. Commun. Netw.2015: 166 (2015)]]>https://dblp.org/rec/journals/ejwcn/JinLDZ15Thu, 01 Jan 2015 00:00:00 +0100QoS-aware Opportunistic Cooperative ARQ Mechanism of Sensors Based on Channel state Sensing for Internet of Things.https://doi.org/10.3991/ijoe.v11i3.4281Yong Jin, Ruigang Li, Ya Fan, Lu Shen: QoS-aware Opportunistic Cooperative ARQ Mechanism of Sensors Based on Channel state Sensing for Internet of Things.Int. J. Online Eng.11(3): 4-13 (2015)]]>https://dblp.org/rec/journals/ijoe/JinLFS15Thu, 01 Jan 2015 00:00:00 +0100HAG: An Energy-Proportional Data Storage Scheme for Disk Array Systems.https://doi.org/10.1007/s11390-015-1554-xPeiquan Jin, Xike Xie, Christian S. Jensen, Yong Jin, Lihua Yue: HAG: An Energy-Proportional Data Storage Scheme for Disk Array Systems.J. Comput. Sci. Technol.30(4): 679-695 (2015)]]>https://dblp.org/rec/journals/jcst/JinXJJY15Thu, 01 Jan 2015 00:00:00 +0100Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment.https://doi.org/10.2197/ipsjjip.23.441Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment.J. Inf. Process.23(4): 441-448 (2015)]]>https://dblp.org/rec/journals/jip/JinYON15Thu, 01 Jan 2015 00:00:00 +0100一种基于邮件列表的软件问答信息抽取方法 (Mailing List Based QA Information Extraction Approach).http://www.jsjkx.com/CN/Y2015/V42/I12/23Yuxiang Luo, Yanzhen Zou, Yong Jin, Bing Xie: 一种基于邮件列表的软件问答信息抽取方法 (Mailing List Based QA Information Extraction Approach).计算机科学42(12): 23-25 (2015)]]>https://dblp.org/rec/journals/jsjkx/LuoZJX15Thu, 01 Jan 2015 00:00:00 +0100DOA estimation of moving sound sources in the context of nonuniform spatial noise using acoustic vector sensor.https://doi.org/10.1007/s11045-013-0273-0Yong Jin, Xianxing Liu, Zhentao Hu, Song Li, Yunshan Hou: DOA estimation of moving sound sources in the context of nonuniform spatial noise using acoustic vector sensor.Multidimens. Syst. Signal Process.26(1): 321-336 (2015)]]>https://dblp.org/rec/journals/mssp/JinLHLH15Thu, 01 Jan 2015 00:00:00 +0100Joint Probabilistic Constrained Robust Beamforming and Antenna Selection.https://doi.org/10.1007/s11277-015-2710-xYong Jin, Zhentao Hu, Jinwang Yue, Xianxing Liu: Joint Probabilistic Constrained Robust Beamforming and Antenna Selection.Wirel. Pers. Commun.84(4): 2385-2396 (2015)]]>https://dblp.org/rec/journals/wpc/JinHYL15Thu, 01 Jan 2015 00:00:00 +0100Web server performance enhancement by suppressing network traffic for high performance client.https://doi.org/10.1109/APNOMS.2015.7275385Yong Jin, Masahiko Tomoishi: Web server performance enhancement by suppressing network traffic for high performance client.APNOMS2015: 448-451]]>https://dblp.org/rec/conf/apnoms/JinT15Thu, 01 Jan 2015 00:00:00 +0100Implementation of reconfigurable mobile device with licensed shared access functionality.https://doi.org/10.1109/APSIPA.2015.7415346Yong Jin, Kyunghoon Kim, Seungwon Choi, Markus Mueck, Vladimir Ivanov: Implementation of reconfigurable mobile device with licensed shared access functionality.APSIPA2015: 635-638]]>https://dblp.org/rec/conf/apsipa/JinKCM015Thu, 01 Jan 2015 00:00:00 +0100Operation of reconfigurable mobile device for spectrum sharing.https://doi.org/10.1109/APSIPA.2015.7415347Kyunghoon Kim, Yong Jin, Donghyun Keum, Seungwon Choi, Markus Mueck, Vladimir Ivanov: Operation of reconfigurable mobile device for spectrum sharing.APSIPA2015: 639-642]]>https://dblp.org/rec/conf/apsipa/KimJKCM015Thu, 01 Jan 2015 00:00:00 +0100Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System.https://doi.org/10.1109/COMPSAC.2015.220Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin: Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System.COMPSAC Workshops2015: 127-132]]>https://dblp.org/rec/conf/compsac/OtsukaGYOJ15Thu, 01 Jan 2015 00:00:00 +0100Secure Glue: A Cache and Zone Transfer Considering Automatic Renumbering.https://doi.org/10.1109/COMPSAC.2015.38Yong Jin, Kenji Fujikawa, Hiroaki Harai, Masataka Ohta: Secure Glue: A Cache and Zone Transfer Considering Automatic Renumbering.COMPSAC2015: 393-398]]>https://dblp.org/rec/conf/compsac/JinFHO15Thu, 01 Jan 2015 00:00:00 +0100Detection Method of DNS-based Botnet Communication Using Obtained NS Record History.https://doi.org/10.1109/COMPSAC.2015.132Hikaru Ichise, Yong Jin, Katsuyoshi Iida: Detection Method of DNS-based Botnet Communication Using Obtained NS Record History.COMPSAC Workshops2015: 676-677]]>https://dblp.org/rec/conf/compsac/IchiseJI15Thu, 01 Jan 2015 00:00:00 +0100Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries.https://doi.org/10.1109/CSCloud.2015.53Yong Jin, Hikaru Ichise, Katsuyoshi Iida: Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries.CSCloud2015: 37-41]]>https://dblp.org/rec/conf/cscloud/JinII15Thu, 01 Jan 2015 00:00:00 +0100Quick Trigger on Stack Overflow: A Study of Gamification-Influenced Member Tendencies.https://doi.org/10.1109/MSR.2015.57Yong Jin, Xin Yang, Raula Gaikovina Kula, Eunjong Choi, Katsuro Inoue, Hajimu Iida: Quick Trigger on Stack Overflow: A Study of Gamification-Influenced Member Tendencies.MSR2015: 434-437]]>https://dblp.org/rec/conf/msr/JinYKCII15Thu, 01 Jan 2015 00:00:00 +0100Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications.https://doi.org/10.1109/PACRIM.2015.7334837Hikaru Ichise, Yong Jin, Katsuyoshi Iida: Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications.PACRIM2015: 216-221]]>https://dblp.org/rec/conf/pacrim/IchiseJI15Thu, 01 Jan 2015 00:00:00 +0100Mass Cooperative Transmission and QoS Supported Mechanism in Wireless Sensor Networks.https://doi.org/10.1155/2014/363584Gelan Yang, Deguang Le, Yong Jin, Suqun Cao: Mass Cooperative Transmission and QoS Supported Mechanism in Wireless Sensor Networks.Int. J. Distributed Sens. Networks10 (2014)]]>https://dblp.org/rec/journals/ijdsn/YangLJC14Wed, 01 Jan 2014 00:00:00 +0100Channel Aware Cooperative FEC/ARQ Mechanism Based on Kalman Filter Prediction for Wireless Sensor Networks.https://doi.org/10.3991/ijoe.v10i1.3164Yong Jin, Kaijian Xia: Channel Aware Cooperative FEC/ARQ Mechanism Based on Kalman Filter Prediction for Wireless Sensor Networks.Int. J. Online Eng.10(1): 22-28 (2014)]]>https://dblp.org/rec/journals/ijoe/JinX14Wed, 01 Jan 2014 00:00:00 +0100Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks.https://doi.org/10.4304/jnw.9.2.481-487Yong Jin, Peng Ruan: Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks.J. Networks9(2): 481-487 (2014)]]>https://dblp.org/rec/journals/jnw/JinR14Wed, 01 Jan 2014 00:00:00 +0100Adaptive Opportunistic Cooperative Control Mechanism Based on Combination Forecasting and Multilevel Sensing Technology of Sensors for Mobile Internet of Things.https://doi.org/10.1155/2014/297368Yong Jin, Kaijian Xia, Xiaogang Ren, Jian Cai, Hongchun Fan: Adaptive Opportunistic Cooperative Control Mechanism Based on Combination Forecasting and Multilevel Sensing Technology of Sensors for Mobile Internet of Things.J. Sensors2014: 297368:1-297368:9 (2014)]]>https://dblp.org/rec/journals/js/JinXRCF14Wed, 01 Jan 2014 00:00:00 +0100A Conjugate Gradient Neural Network for inspection of glass defects.https://doi.org/10.1109/FSKD.2014.6980920Yong Jin, Youxing Chen, Zhaoba Wang: A Conjugate Gradient Neural Network for inspection of glass defects.FSKD2014: 698-703]]>https://dblp.org/rec/conf/fskd/JinCW14Wed, 01 Jan 2014 00:00:00 +0100Mining API Usage Examples from Test Code.https://doi.org/10.1109/ICSME.2014.52Zixiao Zhu, Yanzhen Zou, Bing Xie, Yong Jin, Zeqi Lin, Lu Zhang: Mining API Usage Examples from Test Code.ICSME2014: 301-310]]>https://dblp.org/rec/conf/icsm/ZhuZXJL014Wed, 01 Jan 2014 00:00:00 +0100High Reliable Relay Selection Approach for QoS Provisioning in Wireless Distributed Sensor Networks.https://doi.org/10.1155/2013/216478Yong Jin: High Reliable Relay Selection Approach for QoS Provisioning in Wireless Distributed Sensor Networks.Int. J. Distributed Sens. Networks9 (2013)]]>https://dblp.org/rec/journals/ijdsn/Jin13Tue, 01 Jan 2013 00:00:00 +0100A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming.https://doi.org/10.11185/imt.8.757Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming.Inf. Media Technol.8(3): 757-765 (2013)]]>https://dblp.org/rec/journals/imt/JinYYON13Tue, 01 Jan 2013 00:00:00 +0100Energy-Aware Adaptive Cooperative FEC Protocol in MIMO Channel for Wireless Sensor Networks.https://doi.org/10.1155/2013/891429Yong Jin, Guangwei Bai: Energy-Aware Adaptive Cooperative FEC Protocol in MIMO Channel for Wireless Sensor Networks.J. Electr. Comput. Eng.2013: 891429:1-891429:9 (2013)]]>https://dblp.org/rec/journals/jece/JinB13Tue, 01 Jan 2013 00:00:00 +0100A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming.https://doi.org/10.2197/ipsjjip.21.441Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming.J. Inf. Process.21(3): 441-449 (2013)]]>https://dblp.org/rec/journals/jip/JinYYON13Tue, 01 Jan 2013 00:00:00 +0100Research in Clustering Algorithm for Diseases Analysis.https://doi.org/10.4304/jnw.8.7.1632-1639Kaijian Xia, Yue Wu, Xiaogang Ren, Yong Jin: Research in Clustering Algorithm for Diseases Analysis.J. Networks8(7): 1632-1639 (2013)]]>https://dblp.org/rec/journals/jnw/XiaWRJ13Tue, 01 Jan 2013 00:00:00 +0100An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment.https://doi.org/10.1109/COMPSACW.2013.77Takuya Yamaguchi, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura: An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment.COMPSAC Workshops2013: 575-580]]>https://dblp.org/rec/conf/compsac/YamaguchiJYOON13Tue, 01 Jan 2013 00:00:00 +0100Assessing Software Quality through Web Comment Search and Analysis.https://doi.org/10.1007/978-3-642-38977-1_14Yanzhen Zou, Changsheng Liu, Yong Jin, Bing Xie: Assessing Software Quality through Web Comment Search and Analysis.ICSR2013: 208-223]]>https://dblp.org/rec/conf/icsr/ZouLJX13Tue, 01 Jan 2013 00:00:00 +0100Generating API-usage example for project developers.https://doi.org/10.1145/2532443.2532470Zixiao Zhu, Yanzhen Zou, Yong Jin, Bing Xie: Generating API-usage example for project developers.Internetware2013: 34:1-34:4]]>https://dblp.org/rec/conf/internetware/ZhuZJX13Tue, 01 Jan 2013 00:00:00 +0100Aesthetic photo composition by optimal crop-and-warp.https://doi.org/10.1016/j.cag.2012.07.007Yong Jin, Qingbiao Wu, Ligang Liu: Aesthetic photo composition by optimal crop-and-warp.Comput. Graph.36(8): 955-965 (2012)]]>https://dblp.org/rec/journals/cg/JinWL12Sun, 01 Jan 2012 00:00:00 +0100Unsupervised upright orientation of man-made models.https://doi.org/10.1016/j.gmod.2012.03.007Yong Jin, Qingbiao Wu, Ligang Liu: Unsupervised upright orientation of man-made models.Graph. Model.74(4): 99-108 (2012)]]>https://dblp.org/rec/journals/cvgip/JinWL12Sun, 01 Jan 2012 00:00:00 +0100An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.https://doi.org/10.11185/imt.7.831Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.Inf. Media Technol.7(2): 831-840 (2012)]]>https://dblp.org/rec/journals/imt/JinYON12Sun, 01 Jan 2012 00:00:00 +0100An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.https://doi.org/10.2197/ipsjjip.20.386Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.J. Inf. Process.20(2): 386-395 (2012)]]>https://dblp.org/rec/journals/jip/JinYON12Sun, 01 Jan 2012 00:00:00 +0100SOPC-based cooperative awareness nodes in smart multimedia sensor networks.https://doi.org/10.1109/ChinaCom.2012.6417451Yi Zhou, Huiping Li, Chunlin Wan, Zhentao Hu, Yong Jin: SOPC-based cooperative awareness nodes in smart multimedia sensor networks.CHINACOM2012: 71-75]]>https://dblp.org/rec/conf/chinacom/ZhouLWHJ12Sun, 01 Jan 2012 00:00:00 +0100Multihoming Method Using Routing Header in IPv6 Environment.https://doi.org/10.1109/SAINT.2012.63Takuya Yamaguchi, Yong Jin, Ryoichi Tokumoto, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: Multihoming Method Using Routing Header in IPv6 Environment.SAINT2012: 351-356]]>https://dblp.org/rec/conf/saint/YamaguchiJTYON12Sun, 01 Jan 2012 00:00:00 +0100iFrames: A Multi-level Keyframe Extraction and Navigation Tool for Videos.https://doi.org/10.1109/CAD/Graphics.2011.34Yong Jin, Ligang Liu, Qingbiao Wu: iFrames: A Multi-level Keyframe Extraction and Navigation Tool for Videos.CAD/Graphics2011: 176-182]]>https://dblp.org/rec/conf/cadgraphics/JinLW11Sat, 01 Jan 2011 00:00:00 +0100The project schedule management model based on the program evaluation and review technique and Bayesian networks.https://doi.org/10.1109/ICAL.2011.6024747Yong Jin, Zhigang Zhao: The project schedule management model based on the program evaluation and review technique and Bayesian networks.ICAL2011: 379-383]]>https://dblp.org/rec/conf/ical/JinZ11Sat, 01 Jan 2011 00:00:00 +0100Proposal of an Adaptive Firewall System in Collaboration with Extended DNS.https://doi.org/10.1109/SAINT.2011.40Yong Jin, Nariyoshi Yamai: Proposal of an Adaptive Firewall System in Collaboration with Extended DNS.SAINT2011: 222-225]]>https://dblp.org/rec/conf/saint/JinY11Sat, 01 Jan 2011 00:00:00 +0100Application of Linear Prediction Technique to Passive Synthetic Aperture Processing.https://doi.org/10.1155/2010/751069Yunshan Hou, Jianguo Huang, Min Jiang, Yong Jin: Application of Linear Prediction Technique to Passive Synthetic Aperture Processing.EURASIP J. Adv. Signal Process.2010 (2010)]]>https://dblp.org/rec/journals/ejasp/HouHJJ10Fri, 01 Jan 2010 00:00:00 +0100Nonhomogeneous scaling optimization for realtime image resizing.https://doi.org/10.1007/s00371-010-0472-8Yong Jin, Ligang Liu, Qingbiao Wu: Nonhomogeneous scaling optimization for realtime image resizing.Vis. Comput.26(6-8): 769-778 (2010)]]>https://dblp.org/rec/journals/vc/JinLW10Fri, 01 Jan 2010 00:00:00 +0100Realtime Aesthetic Image Retargeting.https://doi.org/10.2312/COMPAESTH/COMPAESTH10/001-008Ligang Liu, Yong Jin, Qingbiao Wu: Realtime Aesthetic Image Retargeting.CAe2010: 1-8]]>https://dblp.org/rec/conf/cae/LiuJW10Fri, 01 Jan 2010 00:00:00 +0100An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.https://doi.org/10.1109/SAINT.2010.21Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura: An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks.SAINT2010: 52-58]]>https://dblp.org/rec/conf/saint/JinYON10Fri, 01 Jan 2010 00:00:00 +0100A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses.https://doi.org/10.1109/SAINT.2010.22Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura: A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses.SAINT2010: 129-132]]>https://dblp.org/rec/conf/saint/SeikeJYOKN10Fri, 01 Jan 2010 00:00:00 +0100A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment.https://doi.org/10.1109/SAINT.2010.96Sho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai: A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment.SAINT2010: 245-248]]>https://dblp.org/rec/conf/saint/JitsutoJOY10Fri, 01 Jan 2010 00:00:00 +0100A fast high-resolution method for bearing estimation in shallow ocean.https://doi.org/10.1007/s11045-008-0070-3Yong Jin, Jianguo Huang, Lijie Zhang, Yunshan Hou: A fast high-resolution method for bearing estimation in shallow ocean.Multidimens. Syst. Signal Process.20(4): 397-406 (2009)]]>https://dblp.org/rec/journals/mssp/JinHZH09Thu, 01 Jan 2009 00:00:00 +0100Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks.https://doi.org/10.4236/ijcns.2008.14041Hang Shen, Guangwei Bai, Junyuan Wang, Yong Jin, Jinjing Tao: Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks.Int. J. Commun. Netw. Syst. Sci.1(4): 329-338 (2008)]]>https://dblp.org/rec/journals/ijcns/ShenBWJT08Tue, 01 Jan 2008 00:00:00 +0100DOA Estimation Fast Algorithm for Short Sampling Wideband Sources Based on Metropolis-Hastings Sampling.https://doi.org/10.1109/ICNC.2008.906Yong Jin, Yunzhi Cheng, Jie Li, Jianjun Zhao: DOA Estimation Fast Algorithm for Short Sampling Wideband Sources Based on Metropolis-Hastings Sampling.ICNC (5)2008: 499-503]]>https://dblp.org/rec/conf/icnc/JinCLZ08Tue, 01 Jan 2008 00:00:00 +0100On Developing China's Third Party Payment.https://doi.org/10.1007/978-0-387-75466-6_66Yong Jin, Wei Song, Jingyi Zhang: On Developing China's Third Party Payment.I3E (1)2007: 578-585]]>https://dblp.org/rec/conf/i3e/JinSZ07Mon, 01 Jan 2007 00:00:00 +0100On Chinese tourism e-business development on current stage.https://doi.org/10.1007/978-0-387-75466-6_67Yong Jin, Xu song Xu: On Chinese tourism e-business development on current stage.I3E (1)2007: 586-592]]>https://dblp.org/rec/conf/i3e/JinX07Mon, 01 Jan 2007 00:00:00 +0100Wideband Beam-Space DOA Estimation Based on Genetic Algorithm.https://doi.org/10.1109/ICNC.2007.814Yong Jin, Jianguo Huang, Jianjun Zhao: Wideband Beam-Space DOA Estimation Based on Genetic Algorithm.ICNC (3)2007: 791-798]]>https://dblp.org/rec/conf/icnc/JinHZ07Mon, 01 Jan 2007 00:00:00 +0100