
Jing Tao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j29]Xiaobo Ma, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi, Zhi-Li Zhang:
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers. IEEE Commun. Mag. 59(2): 64-69 (2021) - [j28]Jing Tao, Zhenming Yuan, Li Sun, Kai Yu, Zhifen Zhang
:
Fetal birthweight prediction with measured data by a temporal machine learning method. BMC Medical Informatics Decis. Mak. 21(1): 26 (2021) - [j27]Clive H. Y. Wong
, Jiao Liu
, Tatia Mei-Chun Lee, Jing Tao, Alex W. K. Wong
, Bolton K. H. Chau
, Lidian Chen, Chetwyn C. H. Chan
:
Fronto-cerebellar connectivity mediating cognitive processing speed. NeuroImage 226: 117556 (2021) - [j26]Yuanming Zhang, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang:
A machine learning based approach for user privacy preservation in social networks. Peer Peer Netw. Appl. 14(3): 1596-1607 (2021) - 2020
- [j25]Lin Lan
, Pinghui Wang, Junzhou Zhao
, Jing Tao, John C. S. Lui, Xiaohong Guan:
Improving network embedding with partially available vertex and edge content. Inf. Sci. 512: 935-951 (2020) - [j24]Changyu Wang, Xiaohong Guan, Tao Qin, Pinghui Wang, Jing Tao, Yongwei Meng, Jingyuan Liu:
Addressing the train-test gap on traffic classification combined subflow model with ensemble learning. Knowl. Based Syst. 204: 106192 (2020) - [j23]Yun Zhang, Yongguo Liu, Rongjiang Jin, Jing Tao, Lidian Chen, Xindong Wu:
GLLPA: A Graph Layout based Label Propagation Algorithm for community detection. Knowl. Based Syst. 206: 106363 (2020) - [j22]Jing Tao:
Trinity tests of functions for conditional moment models. J. Multivar. Anal. 178: 104604 (2020) - [j21]Lulu Jiang, Huan Wu
, Jing Tao, John S. Kimball, Lorenzo Alfieri
, Xiuwan Chen:
Satellite-Based Evapotranspiration in Hydrological Model Calibration. Remote. Sens. 12(3): 428 (2020) - [c46]Junzhou Zhao, Pinghui Wang, Jing Tao, Shuo Zhang, John C. S. Lui:
Continuously Tracking Core Items in Data Streams with Probabilistic Decays. ICDE 2020: 769-780 - [c45]Lin Lan, Pinghui Wang, Xuefeng Du, Kaikai Song, Jing Tao, Xiaohong Guan:
Node Classification on Graphs with Few-Shot Novel Labels via Meta Transformed Network Embedding. NeurIPS 2020 - [i8]Lin Lan, Pinghui Wang, Xuefeng Du, Kaikai Song, Jing Tao, Xiaohong Guan:
Node Classification on Graphs with Few-Shot Novel Labels via Meta Transformed Network Embedding. CoRR abs/2007.02914 (2020)
2010 – 2019
- 2019
- [j20]Juxiang Zeng, Pinghui Wang, Qiqi Zhao, Jianye Pang, Jing Tao, Xiaohong Guan:
Effectively Linking Persons on Cameras and Mobile Devices on Networks. IEEE Internet Comput. 23(4): 18-26 (2019) - [j19]Pinghui Wang, Junzhou Zhao, Xiangliang Zhang
, Jing Tao, Xiaohong Guan:
SNOD: a fast sampling method of exploring node orbit degrees for large graphs. Knowl. Inf. Syst. 61(1): 301-326 (2019) - [j18]Pinghui Wang
, Yiyan Qi, John C. S. Lui
, Don Towsley
, Junzhou Zhao, Jing Tao:
Inferring Higher-Order Structure Statistics of Large Networks from Sampled Edges. IEEE Trans. Knowl. Data Eng. 31(1): 61-74 (2019) - [j17]Pinghui Wang
, Peng Jia
, Jing Tao, Xiaohong Guan:
Detecting a Variety of Long-Term Stealthy User Behaviors on High Speed Links. IEEE Trans. Knowl. Data Eng. 31(10): 1912-1925 (2019) - [j16]Pinghui Wang
, Xiangyu Wang, Jing Tao, Peng Zhang
, Xiaohong Guan:
Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams. IEEE Trans. Parallel Distributed Syst. 30(2): 300-314 (2019) - [c44]Jing Tao, Hongyu Li, Peng Zhao, Yu Dian Lim, Anak Agung Alit Apriyana, Chuan Seng Tan:
Design Considerations and Fabrication Challenges of Surface Electrode Ion Trap with TSV Integration. 3DIC 2019: 1-5 - [c43]Shihao Yan, Jing Tao, Jian Huang
, Anshun Xue:
Model Predictive Control for Human Following Rehabilitation Robot. ARSO 2019: 369-374 - [c42]Yuanming Zhang, Shuo Zhang, Yuchao Zhang, Jing Tao, Pinghui Wang:
A Large-Scale Empirical Study of Internet Users' Privacy Leakage in China. DASC/PiCom/DataCom/CyberSciTech 2019: 406-411 - [c41]Ting Han, Yuanming Zhang, Hezhen Li, Xiaoyu Zhang, Jing Tao:
Large-Scale Network Traffic Analysis and Retrieval System Using CFS Algorithm. DASC/PiCom/DataCom/CyberSciTech 2019: 417-421 - [c40]Jing Tao, Waner Wang, Ning Zheng, Ting Han, Yue Chang, Xuna Zhan:
An Abnormal Login Detection Method Based on Multi-source Log Fusion Analysis. ICBK 2019: 229-235 - [c39]Jing Tao, Ning Zheng, Waner Wang, Ting Han, Xuna Zhan, Qingxin Luan:
A Behavior Sequence Clustering-Based Enterprise Network Anomaly Host Recognition Method. ICBK 2019: 236-241 - [c38]Yuanming Zhang, Ting Han, Zelin Hao, Yu Cao, Jing Tao:
An Efficient Application Traffic Signature Generation System. ICBK 2019: 341-347 - [c37]Pinghui Wang, Peng Jia, Yiyan Qi, Yu Sun, Jing Tao, Xiaohong Guan:
REPT: A Streaming Algorithm of Approximating Global and Local Triangle Counts in Parallel. ICDE 2019: 758-769 - [c36]Pinghui Wang, Peng Jia, Xiangliang Zhang
, Jing Tao, Xiaohong Guan, Don Towsley:
Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities Over Time. ICDE 2019: 1094-1105 - [c35]Peng Jia, Pinghui Wang, Jing Tao, Xiaohong Guan:
A Fast Sketch Method for Mining User Similarities Over Fully Dynamic Graph Streams. ICDE 2019: 1682-1685 - [c34]Chuan Liu, Gang Zhang, Jing Tao, Dingde Jiang, Sheng Qi, Jingbao Lu:
Active Measurement Approach to Traffic QoS Sensing for Smart Network Access in SDN. ICII 2019: 103-108 - [c33]Nuo Xu, Pinghui Wang, Long Chen, Jing Tao, Junzhou Zhao:
MR-GNN: Multi-Resolution and Dual Graph Neural Network for Predicting Structured Entity Interactions. IJCAI 2019: 3968-3974 - [i7]Peng Jia, Pinghui Wang, Jing Tao, Xiaohong Guan:
A Fast Sketch Method for Mining User Similarities over Fully Dynamic Graph Streams. CoRR abs/1901.00650 (2019) - [i6]Nuo Xu, Pinghui Wang, Long Chen, Jing Tao, Junzhou Zhao:
MR-GNN: Multi-Resolution and Dual Graph Neural Network for Predicting Structured Entity Interactions. CoRR abs/1905.09558 (2019) - 2018
- [j15]Yang Hao, Yu Wu, Pan Li, Jing Tao, Yi Teng, Guan Hao:
Non-destructive inspection on anchorage defect of hollow grouted rock bolt using wavelet transform analysis. EURASIP J. Image Video Process. 2018: 146 (2018) - [j14]Pinghui Wang, Feiyang Sun
, Di Wang, Jing Tao, Xiaohong Guan, Albert Bifet
:
Predicting attributes and friends of mobile users from AP-Trajectories. Inf. Sci. 463-464: 110-128 (2018) - [j13]Pinghui Wang
, Junzhou Zhao, Xiangliang Zhang
, Zhenguo Li, Jiefeng Cheng, John C. S. Lui, Don Towsley, Jing Tao, Xiaohong Guan:
MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs. IEEE Trans. Knowl. Data Eng. 30(1): 73-86 (2018) - [c32]Minghan Li, Qi Xie, Qian Zhao, Wei Wei, Shuhang Gu, Jing Tao, Deyu Meng:
Video Rain Streak Removal by Multiscale Convolutional Sparse Coding. CVPR 2018: 6644-6653 - [c31]Pinghui Wang, Peng Jia, Jing Tao, Xiaohong Guan:
Mining Long-Term Stealthy User Behaviors on High Speed Links. INFOCOM 2018: 2051-2059 - [i5]Pinghui Wang, Peng Jia, Xiangliang Zhang, Jing Tao, Xiaohong Guan, Don Towsley:
Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities over Time. CoRR abs/1811.09126 (2018) - [i4]Pinghui Wang, Peng Jia, Yiyan Qi, Yu Sun, Jing Tao, Xiaohong Guan:
REPT: A Streaming Algorithm of Approximating Global and Local Triangle Counts in Parallel. CoRR abs/1811.09136 (2018) - 2017
- [j12]Moyi Li, Guohua Zheng, Yuhui Zheng, Zhenyu Xiong, Rui Xia
, Wenji Zhou, Qin Wang, Shengxiang Liang, Jing Tao, Lidian Chen:
Alterations in resting-state functional connectivity of the default mode network in amnestic mild cognitive impairment: an fMRI study. BMC Medical Imaging 17(1): 48:1-48:8 (2017) - [j11]Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, Xiaohong Guan:
Mining repeating pattern in packet arrivals: Metrics, models, and applications. Inf. Sci. 408: 1-22 (2017) - [j10]Jing Tao, Pinghui Wang, Xiaohong Guan, Wenjun Hu:
AL-bitmap: Monitoring network traffic activity graphs on high speed links. Inf. Sci. 408: 162-175 (2017) - [j9]Pinghui Wang, Yiyan Qi, Yu Sun, Xiangliang Zhang, Jing Tao, Xiaohong Guan:
Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage. Proc. VLDB Endow. 11(2): 162-175 (2017) - [c30]Jing Tao, Yan Zhang, Pengfei Cao, Zheng Wang, Qiqi Zhao:
An Android Malware Detection System Based on Behavior Comparison Analysis. ICA3PP 2017: 387-396 - [c29]Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang, Yan Zhang:
APK-DFS: An Automatic Interaction System Based on Depth-First-Search for APK. ICA3PP 2017: 420-430 - [c28]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu:
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks. TrustCom/BigDataSE/ICESS 2017: 89-95 - [c27]Pinghui Wang, Feiyang Sun
, Di Wang, Jing Tao, Xiaohong Guan, Albert Bifet
:
Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories. WWW (Companion Volume) 2017: 139-147 - 2016
- [j8]Xianming Gao, Baosheng Wang, Hua-Wei Xue, Jing Tao:
On flow isolation mechanism for different applications in NFV controller. Int. J. High Perform. Syst. Archit. 6(3): 179-186 (2016) - [c26]Peng Peng, Sifeng Liu, Chuanmin Mi, Jing Tao:
A study on the assessment of power system security risk based on grey clustering and maximum entropy theory. SMC 2016: 3002-3007 - [i3]Pinghui Wang, Xiangliang Zhang, Zhenguo Li, Jiefeng Cheng, John C. S. Lui, Don Towsley, Junzhou Zhao, Jing Tao, Xiaohong Guan:
A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs. CoRR abs/1604.08691 (2016) - 2015
- [j7]Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C. S. Lui, Don Towsley:
Accurate DNS query characteristics estimation via active probing. J. Netw. Comput. Appl. 47: 72-84 (2015) - [c25]Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan:
Modeling repeating behaviors in packet arrivals: Detection and measurement. INFOCOM 2015: 2461-2469 - [c24]Ting Zhang, Chuanmin Mi, Shaoguang Zhang, Jing Tao:
Local Government Debt Risk Evaluation Based on Metabolic GM (1, 1) Model. SMC 2015: 629-634 - [i2]Pinghui Wang, Jing Tao, Junzhou Zhao, Xiaohong Guan:
Moss: A Scalable Tool for Efficiently Sampling and Counting 4- and 5-Node Graphlets. CoRR abs/1509.08089 (2015) - 2014
- [j6]Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin:
A New Sketch Method for Measuring Host Connection Degree Distribution. IEEE Trans. Inf. Forensics Secur. 9(6): 948-960 (2014) - [j5]Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. IEEE Trans. Inf. Forensics Secur. 9(11): 1906-1921 (2014) - [c23]Jing Tao, Alan Mathewson
, Kafil M. Razeeb:
Bumpless interconnects formed with nanowire ACF for 3D applications. 3DIC 2014: 1-6 - [c22]Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han:
MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph. ICCCN 2014: 1-7 - 2013
- [c21]Jianfeng Li, Xiaobo Ma, Jing Tao, Xiaohong Guan:
Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting. ICC 2013: 2540-2544 - [c20]Shuo Zhang, Baosheng Wang, Baokang Zhao, Zhenghu Gong, Jing Tao:
A Novel Resource Allocation Heuristic for a Power Constrained Data Center. NBiS 2013: 255-260 - [c19]Jing Tao, Peng Wang, Hong Qiao, Zhipeng Tang:
Facility layouts based on differential evolution algorithm. ROBIO 2013: 1778-1783 - [c18]Shuo Zhang, Baosheng Wang, Baokang Zhao, Jing Tao:
An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center. TrustCom/ISPA/IUCC 2013: 1471-1477 - [c17]Pengcheng Yang, Xiaoyu Dang, Xiangbin Yu, Xudong Wang, Jing Tao:
A simple multi-symbol detector for CPM signals. WCSP 2013: 1-4 - [i1]Junzhou Zhao, Pinghui Wang, Jing Tao, Xiaobo Ma, Xiaohong Guan:
A Peep on the Interplays between Online Video Websites and Online Social Networks. CoRR abs/1305.4018 (2013) - 2012
- [j4]Pinghui Wang, Xiaohong Guan, Don Towsley, Jing Tao:
Virtual indexing based methods for estimating node connection degrees. Comput. Networks 56(12): 2773-2787 (2012) - [c16]Shuang Zhao, Patrick P. C. Lee
, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao:
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. ACSAC 2012: 119-128 - [c15]Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan:
Towards active measurement for DNS query behavior of botnets. GLOBECOM 2012: 845-849 - 2011
- [c14]Jing Tao, Baosheng Wang:
Towards Practical IPSec over Challenged Networks. IMIS 2011: 398-402 - 2010
- [j3]Ben Leinfelder, Jing Tao, Duane Costa, Matthew B. Jones
, Mark Servilla
, Margaret O'Brien, Chad Burt:
A metadata-driven approach to loading and querying heterogeneous scientific data. Ecol. Informatics 5(1): 3-8 (2010) - [c13]Wang Li, Li Dong, Jing Tao:
A Fast Global Fuzzy Clustering Algorithm for the Chemical Gray Box Modeling. ACFIE 2010: 571-579 - [c12]Niandong Yin, Ping Xia, Jing Tao:
Construction of virtual experiment platform for research about vehicle driving control at energy-saving. CSCWD 2010: 427-431 - [c11]Xiaobo Ma, Xiaohong Guan, Jing Tao, Qinghua Zheng, Yun Guo, Lu Liu, Shuang Zhao:
A Novel IRC Botnet Detection Method Based on Packet Size Sequence. ICC 2010: 1-5
2000 – 2009
- 2009
- [c10]Linna Chai, Jiancheng Shi, Jinyang Du, Jing Tao, Thomas J. Jackson, Peggy O'Neill, Lixin Zhang, Ying Qu, J. D. Wang:
A Study on Estimation of Aboveground Wet Biomass based on the Microwave Vegetation Indices. IGARSS (3) 2009: 924-927 - [c9]Jing Tao, Wenju Liu:
An Improvement of HSMM-Based Speech Synthesis by Duration-Dependent State Transition Probabilities. ISNN (3) 2009: 621-629 - 2008
- [c8]Ting Wang, Li Wen, Wei Li, Jing Tao, Alan Wang, Fred Baker:
Traffic Shaping in BitTorrent Systems by Centralized Hierarchical Peer-Node Assignment. ICC 2008: 1787-1791 - [c7]Jing Tao, Jiancheng Shi, Thomas J. Jackson, Jinyang Du, Rajat Bindlish
, Lixin Zhang:
Monitoring Vegetation Water Content Using Microwave Vegetation Indices. IGARSS (1) 2008: 197-200 - 2007
- [j2]Randy Butler, Mark Servilla
, Stuart Gage, Jim Basney
, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. Clust. Comput. 10(3): 301-310 (2007) - [c6]Jiancheng Shi, Thomas J. Jackson, Jing Tao, Jinyang Du, Rajat Bindlish
:
Microwave vegetation indexes derived from satellite microwave radiometers. IGARSS 2007: 1412-1415 - 2006
- [j1]Bertram Ludäscher, Ilkay Altintas, Chad Berkley, Dan Higgins, Efrat Jaeger, Matthew B. Jones
, Edward A. Lee
, Jing Tao, Yang Zhao:
Scientific workflow management and the Kepler system. Concurr. Comput. Pract. Exp. 18(10): 1039-1065 (2006) - [c5]Randy Butler, Mark Servilla, Stuart Gage, Jim Basney, Von Welch, Bill Baker, Terry Fleury, Patrick Duda, David Gehrig, Michael Bletzinger, Jing Tao, D. Michael Freemon:
CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment. CLADE 2006: 25-33 - [c4]Jianting Zhang, Ilkay Altintas, Jing Tao, Xianhua Liu, Deana Pennington, William Michener:
Integrating Data Grid and Web Services for E-Science Applications: A Case Study of Exploring Species Distributions. e-Science 2006: 31 - [c3]Buquan Liu, Yiping Yao, Jing Tao, Huaimin Wang:
Development of a runtime infrastructure for large-scale distributed simulations. Winter Simulation Conference 2006: 1036-1043 - [c2]Buquan Liu, Yiping Yao, Jing Tao, Huaimin Wang:
Implementation of time management in a runtime infrastructure. Winter Simulation Conference 2006: 1044-1151 - 2005
- [c1]Chad Berkley, Shawn Bowers, Matthew B. Jones, Bertram Ludäscher, Mark Schildhauer, Jing Tao:
Incorporating Semantics in Scientific Workflow Authoring. SSDBM 2005: 75-78
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-20 22:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint