Name
Affiliation
Papers
JIANGUO SUN
Department of Energy and Power Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
67
Collaborators
Citations 
PageRank 
152
75
30.19
Referers 
Referees 
References 
250
798
320
Search Limit
100798
Title
Citations
PageRank
Year
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing00.342022
Inference of a time-varying coefficient regression model for multivariate panel count data00.342022
Regression Analysis of Interval-Censored Data with Informative Observation Times Under the Accelerated Failure Time Model00.342022
Variable selection for case-cohort studies with informatively interval-censored outcomes00.342022
Object detection in remote sensing images based on deep transfer learning20.362022
Cloud-Based Data Offloading For Multi-Focus And Multi-Views Image Fusion In Mobile Applications00.342021
Two-Level Multimodal Fusion For Sentiment Analysis In Public Security00.342021
Multi-Authority Criteria-Based Encryption Scheme For Iot00.342021
Multi-Block Mixed Sample Semi-Supervised Learning For Sar Target Recognition10.362021
Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE00.342021
A data authentication scheme for UAV ad hoc network communication90.522020
Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System00.342019
An intelligent method of cancer prediction based on mobile cloud computing10.352019
A class of semiparametric transformation cure models for interval-censored failure time data00.342019
Session details - Workshop - WSRRWSN.00.342019
An Ontology Embedding Approach Based on Multiple Neural Networks00.342019
Ev-Gait: Event-Based Robust Gait Recognition Using Dynamic Vision Sensors30.362019
Efficient Estimation of Ontology Entities Distributed Representations.00.342019
Graph-based supervised discrete image hashing10.352019
A multi-focus image fusion algorithm in 5G communications10.362019
Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic.60.432019
Simultaneous estimation and variable selection for incomplete event history studies.00.342019
Semiparametric analysis of the additive hazards model with informatively interval-censored failure time data.00.342018
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.00.342018
Construction of Teaching Quality Assurance System in the Context of Engineering Education Certification.00.342018
IP Network Traffic Analysis Based on Big Data.00.342018
Regarding Engineering Education Professional Certification as a Starting Point, Do a Good Job of Audit Assessment.00.342018
A Large-Scale Image Retrieval Method Based on Image Elimination Technology and Supervised Kernel Hash.00.342018
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm00.342018
Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNs00.342018
Industrial Wireless Sensor Network Topology Non-Uniform Node Optimization Deployment00.342018
Improving Wireless Devices Identification Using Gray Relationship Classifier To Enhance Wireless Network Security00.342018
A Lightweight Multi-Factor Mobile User Authentication Scheme00.342018
A Novel Hybrid Information Security Scheme for 2D Vector Map.20.392018
Taking Students as the Center, Discussing Some Thoughts on the Certification of Engineering Education Major.00.342018
A Comparative Analysis of SVM, Naive Bayes and GBDT for Data Faults Detection in WSNs10.362018
Variable selection for high-dimensional genomic data with censored outcomes using group lasso prior.00.342017
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT.10.362017
Regression analysis of current status data in the presence of dependent censoring with applications to tumorigenicity experiments.00.342017
Prediction of Cancer Based on Mobile Cloud Computing and SVM00.342017
Sieve maximum likelihood estimation for the proportional hazards model under informative censoring.00.342017
A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication.00.342017
Cox regression analysis of dependent interval-censored failure time data.10.632016
A multiple imputation approach to the analysis of clustered interval-censored failure time data with the additive hazards model.00.342016
Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection.00.342016
Multi-Focus Image Fusion Via Region Mosaicing On Contrast Pyramids00.342016
A support vector machine based naive Bayes algorithm for spam filtering10.342016
Survival prediction and variable selection with simultaneous shrinkage and grouping priors20.502015
A Cross Structured Light Sensor and Stripe Segmentation Method for Visual Tracking of a Wall Climbing Robot20.452015
Regression analysis of multivariate current status data with auxiliary covariates under the additive hazards model.00.342015
  • 1
  • 2