Search

Your search keyword '"Jingsheng Lei"' showing total 227 results

Search Constraints

Start Over You searched for: Author "Jingsheng Lei" Remove constraint Author: "Jingsheng Lei"
227 results on '"Jingsheng Lei"'

Search Results

101. A Distributed and Scalable Approach to Semi-Intrusive Load Monitoring

102. Attribute reduction in decision-theoretic rough set model based on minimum decision cost

103. A simple and robust approach to energy disaggregation in the presence of outliers

104. Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data

105. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles

106. Unsupervised Hyperspectral Band Selection by Dominant Set Extraction

107. Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS

108. Three-branch architecture for stereoscopic 3D salient object detection

109. Anti-compression JPEG steganography over repetitive compression networks

110. Short-Term Power Load Forecasting for Larger Consumer Based on TensorFlow Deep Learning Framework and Clustering-Regression Model

111. Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles

112. SHARK: sparse human action recovery with knowledge of appliances and load curve data

113. A clustering ensemble: Two-level-refined co-association matrix with path-based transformation

114. Visual hierarchical cluster structure: A refined co-association matrix based visual assessment of cluster tendency

115. Finding influential agent groups in complex multiagent software systems based on citation network analyses

116. Incorporating Energy Heterogeneity into Sensor Network Time Synchronization

117. CO-MAP: Improving Mobile Multiple Access Efficiency With Location Input

118. Improving the Uplink Performance of Drive-Thru Internet via Platoon-Based Cooperative Retransmission

119. EKM: An Efficient Key Management Scheme for AMI System in the Smart Grid

120. Towards building a social emotion detection system for online news

121. EAPA: An efficient authentication protocol against pollution attack for smart grid

122. CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid

123. Building emotional dictionary for sentiment analysis of online news

124. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid

125. SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing

126. A tag-based solution for data sensing conflicts in multiple sensing agent systems

127. Toward Automatic Answers in User-Interactive Question Answering Systems

128. The Formal Design Models of a Universal Array (UA) and its Implementation

129. A cross-language focused crawling algorithm based on multiple relevance prediction strategies

130. The meter tells you are at home! Non-intrusive occupancy detection via load curve data

131. BDO-SD: An efficient scheme for big data outsourcing with secure deduplication

132. Network Computing and Information Security : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings

133. An Appliance-Driven Approach to Detection of Corrupted Load Curve Data

135. Introduction

136. Conclusions and Future Works

137. Equality Query for Auction in Emerging Smart Grid Marketing

138. Range Query over Encrypted Metering Data for Financial Audit

139. Emerging Research in Artificial Intelligence and Computational Intelligence : International Conference, AICI 2012, Chengdu, China, October 26-28, 2012. Proceedings

140. Artificial Intelligence and Computational Intelligence : 4th International Conference, AICI 2012, Chengdu, China, October 26-28, 2012, Proceedings

141. Web Information Systems and Mining : International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings

142. Multimedia and Signal Processing : Second International Conference, CMSP 2012, Shanghai, China, December 7-9, 2012, Proceedings

143. Finding Dominating Set from Verbal Contextual Graph for Personalized Search in Folksonomy

144. From Landscape to Portrait: A New Approach for Outlier Detection in Load Curve Data

145. Toward Automatic Answers in User-Interactive Question Answering Systems

146. The Formal Design Models of a Universal Array (UA) and its Implementation

147. Web Information Systems and Mining : International Conference, WISM 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part II

148. Artificial Intelligence and Computational Intelligence : Second International Conference, AICIS 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part I

149. Emerging Research in Artificial Intelligence and ComputationaI Intelligence : International Conference, AICI 2011, Taiyuan, China, September 23-25, 2011. Proceedings

150. Emerging Research in Web Information Systems and Mining : International Conference, WISM 2011, Taiyuan, China, September 23-25, 2011. Proceedings

Catalog

Books, media, physical & digital resources