Name
Affiliation
Papers
JIA CHEN
College of Electronic Science and Engineering, National University of Defense Technology, 410073 Changsha, China
45
Collaborators
Citations 
PageRank 
102
54
16.18
Referers 
Referees 
References 
197
1102
446
Search Limit
1001000
Title
Citations
PageRank
Year
A proportional-integral-derivative-incorporated stochastic gradient descent-based latent factor analysis model00.342021
Hyper-parameter-evolutionary latent factor analysis for high-dimensional and sparse data from recommender systems20.352021
Pain Marker Evaluation Application in Augmented Reality and Mobile Platforms00.342020
Logics for Moderate Belief-Disagreement Between Agents00.342019
Explore Correlation Between Body Balance and Perception using mHealth Technology00.342019
Geometry Aware Tori Decomposition.00.342019
Joint dictionary learning using a new optimization method for single-channel blind source separation.10.352019
Self-Calibrated Multiharmonic Co2 Sensor Using Vcsel For Urban In Situ Measurement00.342019
Entropy-based Dynamic Heterogeneous Ant Colony Optimization10.352019
Speech Emotion Recognition Based on DNN-Decision Tree SVM Model30.392019
Trinity: An Extensible Synthesis Framework for Data Science.10.352019
Approximation numbers of Sobolev and Gevrey type embeddings on the sphere and on the ball - Preasymptotics, asymptotics, and tractability.00.342019
Average case tractability of multivariate approximation with Gaussian kernels.00.342019
Relational verification using reinforcement learning10.352019
Interactive Behavior Of An Immigrant Group On Mobile Instant Messenger-Based Sns: Textual Research On Topic-Centered Interactivity00.342019
Constrained solution of CEC 2017 with monarch butterfly optimisation.00.342019
Text-independent speaker identification based on deep Gaussian correlation supervector00.342019
Technologies and Applications of Narrowband Internet of Things.00.342018
Design of Indoor Temperature Monitoring System based on Narrowband Internet of Things.00.342018
Average case (s, t)-weak tractability of non-homogeneous tensor product problems.00.342018
PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection Approach.00.342018
Smart Prosthesis System: Continuous Automatic Prosthesis Fitting Adjustment and Real-time Stress Visualization10.372018
Fast Computation of Tunnels in Corneal Collagen Structure.00.342018
Deep and shallow features fusion based on deep convolutional neural network for speech emotion recognition.00.342018
Singularity: pattern fuzzing for worst case complexity.50.402018
An efficient latent-factor-based approach to social relationship recommendation00.342018
Improving Monarch Butterfly Optimization Algorithm with Self-Adaptive Population.10.352018
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications00.342018
Image contrast enhancement using an artificial bee colony algorithm.60.402018
Proving Mutual Authentication Property Of Kernees Protocol Based On Logic Of Events00.342018
Logic for Describing Strong Belief-Disagreement Between Agents.00.342018
Randomized latent factor model for high-dimensional and sparse matrices from industrial applications10.352018
A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network.00.342018
Adaptive Image Contrast Enhancement Using Artificial Bee Colony Optimization00.342017
Characterizing Road Segments Using Compass Sensors To Predict Approaching Bus Stops00.342017
EPLS: A novel feature extraction method for migration data clustering.20.362017
Performance of latent factor models with extended linear biases.30.382017
Preasymptotics and asymptotics of approximation numbers of anisotropic Sobolev embeddings.40.672017
Risk Factors Identification for Work-Related Musculoskeletal Disorders with Wearable and Connected Gait Analytics System00.342017
Fuzzy Logic Algorithm Of Hovering Control For The Quadrotor Unmanned Aerial System00.342017
Static detection of asymptotic resource side-channel vulnerabilities in web applications.10.352017
Achieving a scalable and secure software defined network by identifiers separating and mapping.00.342017
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic.180.572017
Research On Crawling Mechanism And Policy For Crawling Product Information From Mobile Internet00.342017
Integrating global and local visual features with semantic hierarchies for two-level image annotation30.372016