


Остановите войну!
for scientists:
Jing Zhong
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j15]Jing Zhong, Yonglin Chen
, Jiaqi Yan
, Jinlian Luo:
The mixed blessing of cyberloafing on innovation performance during the COVID-19 pandemic. Comput. Hum. Behav. 126: 106982 (2022) - [j14]Zhi Wang, Jing Zhong, Yuqing Chen, Ping Zhong:
Sparse robust multiview feature selection via adaptive-weighting strategy. Int. J. Mach. Learn. Cybern. 13(5): 1387-1408 (2022) - [j13]Shuai Wang
, Jing Zhong
, Wenzhong Liu
:
Temperature Measurement Based on Electron Paramagnetic Resonance of Magnetic Nanoparticles. IEEE Trans. Instrum. Meas. 71: 1-8 (2022) - 2021
- [j12]Yunchuan Kang
, Jing Zhong, Ruofeng Li, Yuqiao Liang, Nian Zhang:
Classification Method for Network Security Data Based on Multi-featured Extraction. Int. J. Artif. Intell. Tools 30(1): 2140006:1-2140006:11 (2021) - [j11]Jing Zhong, Ping Zhong, Yimin Xu, Liran Yang:
Robust multiview feature selection via view weighted. Multim. Tools Appl. 80(1): 1503-1527 (2021) - [j10]Guiguang Ding
, Shuo Zhang
, Zizhou Jia, Jing Zhong, Jungong Han
:
Where to Prune: Using LSTM to Guide Data-Dependent Soft Pruning. IEEE Trans. Image Process. 30: 293-304 (2021) - [c28]Yijie Zhao, Bin Zheng, Hao Ye, Jing Zhong, Haiwei Wang:
Comparison of Data-Based Methods for Selecting Treatment Therapy in Hepatocellular Carcinoma. CAA SAFEPROCESS 2021: 1-5 - 2020
- [j9]Zilin Gao
, Jiang Xiong, Jing Zhong, Fuming Liu, Qingshan Liu:
Adaptive State Observer Design for Dynamic Links in Complex Dynamical Networks. Comput. Intell. Neurosci. 2020: 8846438:1-8846438:8 (2020) - [j8]Yandong Yang
, Jing Zhong, Wei Li
, T. Aaron Gulliver
, Shufang Li
:
Semisupervised Multilabel Deep Learning Based Nonintrusive Load Monitoring in Smart Grids. IEEE Trans. Ind. Informatics 16(11): 6892-6902 (2020)
2010 – 2019
- 2019
- [j7]Jing Zhong, Nan Wang, Qiang Lin, Ping Zhong:
Weighted feature selection via discriminative sparse multi-view learning. Knowl. Based Syst. 178: 132-148 (2019) - [c27]Yijie Zhao, Hao Ye, Jing Zhong, Haiwei Wang:
A Decision Tree Based Method for Treatment Therapy of HCC. CAA SAFEPROCESS 2019: 879-883 - [c26]Andrey Garnaev, Wuyang Zhang, Jing Zhong, Roy D. Yates:
Maintaining Information Freshness under Jamming. INFOCOM Workshops 2019: 90-95 - [c25]Jing Zhong, Wuyang Zhang, Roy D. Yates, Andrey Garnaev, Yanyong Zhang:
Age-aware Scheduling for Asynchronous Arriving Jobs in Edge Applications. INFOCOM Workshops 2019: 674-679 - [c24]Roy D. Yates, Jing Zhong, Wuyang Zhang:
Updates with Multiple Service Classes. ISIT 2019: 1017-1021 - [c23]Liran Yang, Jing Zhong, Ping Zhong, Yiming Xue, Juan Wen:
A Novel Feature Selection Model for JPEG Image Steganalysis. IWDW 2019: 322-336 - [c22]Andrey Garnaev, Jing Zhong, Wuyang Zhang, Roy D. Yates, Wade Trappe:
Proportional Fair Information Freshness Under Jamming. WWIC 2019: 91-102 - 2018
- [j6]Peng Shi, Jing Zhong, Andrik Rampun, Hui Wang
:
A hierarchical pipeline for breast boundary segmentation and calcification detection in mammograms. Comput. Biol. Medicine 96: 178-188 (2018) - [j5]Fanzi Zeng, Jing Zhong:
Utility-based cooperative spectrum leasing scheme for CR networks with hybrid energy supplies. IET Commun. 12(5): 509-517 (2018) - [j4]Hongjuan Wu
, Yuming Feng, Zhengwen Tu, Jing Zhong, Qingsong Zeng:
Exponential synchronization of memristive neural networks with time delays. Neurocomputing 297: 1-7 (2018) - [j3]Hongjuan Wu, Yulu Liu, Pei Yan, Gang Fang, Jing Zhong:
A frequent itemset mining algorithm based on composite granular computing. J. Comput. Methods Sci. Eng. 18(1): 247-257 (2018) - [c21]Jing Zhong, Guiguang Ding, Yuchen Guo, Jungong Han, Bin Wang
:
Where to Prune: Using LSTM to Guide End-to-end Pruning. IJCAI 2018: 3205-3211 - [c20]Jing Zhong, Roy D. Yates, Emina Soljanin
:
Minimizing content staleness in dynamo-style replicated storage systems. INFOCOM Workshops 2018: 361-366 - [c19]Jing Zhong, Roy D. Yates, Emina Soljanin
:
Two Freshness Metrics for Local Cache Refresh. ISIT 2018: 1924-1928 - [c18]Qingshan Liu, Jiang Xiong, Jing Zhong, Hong Ying, Kaixuan Li:
A Distributed Algorithm Based on Multi-agent Network for Solving Linear Algebraic Equation. ISNN 2018: 415-422 - [c17]Jing Zhong, Roy D. Yates, Emina Soljanin
:
Timely Lossless Source Coding for Randomly Arriving Symbols. ITW 2018: 1-5 - [c16]Jing Zhong, Roy D. Yates, Emina Soljanin
:
Multicast with Prioritized Delivery: How Fresh is Your Data? SPAWC 2018: 1-5 - [i6]Jing Zhong, Roy D. Yates:
Timeliness in Lossless Block Coding. CoRR abs/1802.09167 (2018) - [i5]Jing Zhong, Roy D. Yates, Emina Soljanin:
Minimizing Content Staleness in Dynamo-Style Replicated Storage Systems. CoRR abs/1804.00742 (2018) - [i4]Jing Zhong, Roy D. Yates, Emina Soljanin:
Multicast With Prioritized Delivery: How Fresh is Your Data? CoRR abs/1808.05738 (2018) - [i3]Jing Zhong, Roy D. Yates, Emina Soljanin:
Timely Lossless Source Coding for Randomly Arriving Symbols. CoRR abs/1810.01533 (2018) - 2017
- [c15]Jing Zhong, Emina Soljanin
, Roy D. Yates:
Status updates through multicast networks. Allerton 2017: 463-469 - [c14]Roy D. Yates, Elie Najm, Emina Soljanin
, Jing Zhong:
Timely updates over an erasure channel. ISIT 2017: 316-320 - [c13]Jing Zhong, Roy D. Yates, Emina Soljanin
:
Backlog-adaptive compression: Age of information. ISIT 2017: 566-570 - [c12]Nian Zhang, Jiang Xiong, Jing Zhong, Lara A. Thompson, Hong Ying:
An Enhanced K-Nearest Neighbor Classification Method Based on Maximal Coherence and Validity Ratings. ISNN (1) 2017: 206-214 - [i2]Roy D. Yates, Elie Najm, Emina Soljanin, Jing Zhong:
Timely Updates over an Erasure Channel. CoRR abs/1704.04155 (2017) - [i1]Jing Zhong, Emina Soljanin, Roy D. Yates:
Status Updates Through Multicast Networks. CoRR abs/1709.02427 (2017) - 2016
- [c11]Jing Zhong, Roy D. Yates:
Timeliness in Lossless Block Coding. DCC 2016: 339-348 - [c10]Fanzi Zeng, Jie Li, Jisheng Xu
, Jing Zhong:
A Trust-Based Cooperative Spectrum Sensing Scheme against SSDF Attack in CRNs. Trustcom/BigDataSE/ISPA 2016: 1167-1173 - 2013
- [c9]Jing Zhong
, Wenzhong Liu, Shiqiang Pi, Pu Zhang:
Optimization for temperature estimation using magnetic nanoparticle: A set of equations solving solution investigation. I2MTC 2013: 1329-1331 - 2011
- [c8]Wei Li, Jing Zhong, T. Aaron Gulliver, Bo Rong, Rose Qingyang Hu, Yi Qian:
Fitting Noisy Data to a Circle: A Simple Iterative Maximum Likelihood Approach. ICC 2011: 1-5 - 2010
- [j2]Jing Zhong, Jianjun Shi, J. C. F. Wu:
Design of DOE-Based Automatic Process Controller With Consideration of Model and Observation Uncertainties. IEEE Trans Autom. Sci. Eng. 7(2): 266-273 (2010) - [j1]Jing Zhong, Jian Liu, Jianjun Shi:
Predictive Control Considering Model Uncertainty for Variation Reduction in Multistage Assembly Processes. IEEE Trans Autom. Sci. Eng. 7(4): 724-735 (2010) - [c7]Wei Li, Jing Zhong, T. Aaron Gulliver:
Mode transfer architecture and cross layer design for connection aware applications in wireless communication systems. CCECE 2010: 1-5 - [c6]Jing Zhong, Jiang Xiong, Xiaofeng Chen, Hongjuan Wu:
A novel model of IDS based on automatic clustering number determination. ICNC 2010: 832-836 - [c5]Zhiyong Feng, Jing Zhong, Wei Li, T. Aaron Gulliver:
Cognitive Multicast Pilot Scheduling for Heterogeneous Networks. VTC Fall 2010: 1-5
2000 – 2009
- 2006
- [c4]Jing Zhong, Jon C. Muzio:
Analyzing Fault Models for Reversible Logic Circuits. IEEE Congress on Evolutionary Computation 2006: 2422-2427 - 2005
- [c3]Jing Zhong, Hong Ying:
A Semantic Web Based Peer-to-Peer Service Registry Network. SKG 2005: 122 - 2004
- [c2]Jing Zhong, Jon C. Muzio:
An Investigation of Non-Linear Machines as PRPGs in BIST. ESA/VLSI 2004: 360-366 - 2003
- [c1]Jing Zhong, Stan Sclaroff:
Segmenting Foreground Objects from a Dynamic Textured Background via a Robust Kalman Filter. ICCV 2003: 44-50
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-28 22:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint