


default search action
Jun Kong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jun Kong 0001
— Jiangnan University, Wuxi, China
- Jun Kong 0002
— Georgia State University, Atlanta, GA, USA
- Jun Kong 0003
— Yunnan University, Kunming, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j89]Qiang Fu
, Jiajia Liu
, Jiadai Wang
, Jun Kong
:
Toward Throughput Optimization: A Congestion Control Scheme for CAM Delivery via NR Sidelink. IEEE Internet Things J. 12(9): 12206-12218 (2025) - [j88]Qin Yuan
, Jun Kong, Chun Liu
, Yushi Jiang:
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence. Inf. Technol. People 38(2): 787-826 (2025) - [j87]Yugen Yi, Panpan Zhao, Hui Sheng, Min Liu, Shicheng Li, Jiangyan Dai, Jun Kong, Shaojie Qiao:
BSDSGANet: Bidirectional Skip-stored Dual-Stream Gated Attention Network for multivariate time series classification. Knowl. Based Syst. 318: 113474 (2025) - [j86]Hui Sun, Guangzhen Yao
, Sandong Zhu, Long Zhang, Hui Xu, Jun Kong:
SOD-YOLOv10: Small Object Detection in Remote Sensing Images Based on YOLOv10. IEEE Geosci. Remote. Sens. Lett. 22: 1-5 (2025) - [j85]Jiangcheng Wang, Yize Li, Xuefeng Tao, Jun Kong:
Frequency domain adaptive framework for visible-infrared person re-identification. Int. J. Mach. Learn. Cybern. 16(4): 2553-2566 (2025) - [c84]Qiang Li, Di Liu, Jun Kong, Sen Li, Hui Xu, Jianzhong Wang:
Temporal Action Localization with Cross Layer Task Decoupling and Refinement. AAAI 2025: 4878-4886 - [c83]Jun Kong, Xinge Ma, Jin Wang, Xuejie Zhang:
Sample-aware Adaptive Structured Pruning for Large Language Models. AAAI 2025: 17938-17946 - 2024
- [j84]Yanlin He, Yugen Yi
, Caixia Zheng, Jun Kong:
BGF-Net: Boundary guided filter network for medical image segmentation. Comput. Biol. Medicine 171: 108184 (2024) - [j83]Zhenhua Yang
, Jun Kong:
Cue-based two factor authentication. Comput. Secur. 146: 104068 (2024) - [j82]Yanlin He, Jun Kong, Di Liu, Juan Li, Caixia Zheng:
Self-ensembling with mask-boundary domain adaptation for optic disc and cup segmentation. Eng. Appl. Artif. Intell. 129: 107635 (2024) - [j81]Tongxin Shi
, Roy A. McCann
, Ying Huang, Wei Wang, Jun Kong
:
Malware Detection for Internet of Things Using One-Class Classification. Sensors 24(13): 4122 (2024) - [j80]Qiang Li
, Guang Zu
, Hui Xu
, Jun Kong
, Yanni Zhang
, Jianzhong Wang
:
An Adaptive Dual Selective Transformer for Temporal Action Localization. IEEE Trans. Multim. 26: 7398-7412 (2024) - [c82]Qiang Fu, Jiajia Liu, Jiadai Wang, Jun Kong:
Optimizing Throughput for NR V2X Message Delivery with Congestion Control. GLOBECOM 2024: 3805-3810 - [i4]Qiang Li, Di Liu, Jun Kong, Sen Li, Hui Xu, Jianzhong Wang:
Temporal Action Localization with Cross Layer Task Decoupling and Refinement. CoRR abs/2412.09202 (2024) - 2023
- [j79]Shuqing Liu
, Hankuan Zhang
, Zhenhua Yang
, Jun Kong, Limin Zhang, Chunhai Gao:
UXBIV: An Evaluation Framework for Business Intelligence Visualization. IEEE Access 11: 92391-92415 (2023) - [j78]Jinlan Liu
, Dongpo Xu, Yinghua Lu, Jun Kong, Danilo P. Mandic:
Last-iterate convergence analysis of stochastic momentum methods for neural networks. Neurocomputing 527: 27-35 (2023) - [j77]Zheng Huang, Yi-Na Li, Jun Kong:
Investigating the multimedia pointing techniques in the tabletop-centric cross-device interaction. Multim. Tools Appl. 82(7): 10077-10098 (2023) - [j76]Hui Xu, Junjie Zhang, Hui Sun, Miao Qi
, Jun Kong:
Analyzing students' attention by gaze tracking and object detection in classroom teaching. Data Technol. Appl. 57(5): 643-667 (2023) - [j75]Yanni Zhang
, Qiang Li
, Miao Qi, Di Liu, Jun Kong, Jianzhong Wang
:
Multi-Scale Frequency Separation Network for Image Deblurring. IEEE Trans. Circuits Syst. Video Technol. 33(10): 5525-5537 (2023) - [c81]Wordh Ul Hasan, Juan Li, Shadi Alian, Tianyi Liang, Vikram Pandey, Kimia Tuz Zaman, Jun Kong, Cui Tao:
Honoring Heritage, Managing Health: A Mobile Diabetes Self-Management App for Native Americans with Cultural Sensitivity and Local Factors. ISCC 2023: 1-6 - 2022
- [j74]Wenhe Chen, Yuan Chai, Miao Qi, Hui Sun, Qi Pu, Jun Kong, Caixia Zheng:
Bottom-up improved multistage temporal convolutional network for action segmentation. Appl. Intell. 52(12): 14053-14069 (2022) - [j73]Jinlan Liu
, Jun Kong, Dongpo Xu
, Miao Qi, Yinghua Lu:
Convergence analysis of AdaBound with relaxed bound functions for non-convex optimization. Neural Networks 145: 300-307 (2022) - [j72]Wenhe Chen
, Hui Xu, Chao Zhu, Xiaoli Liu, Yinghua Lu, Caixia Zheng
, Jun Kong:
Gaze Estimation via the Joint Modeling of Multiple Cues. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1390-1402 (2022) - [c80]Yiming Liu
, Yanni Zhang, Qiang Li, Jun Kong, Miao Qi, Jianzhong Wang
:
Double Closed-Loop Network for Image Deblurring. ICASSP 2022: 2325-2329 - [i3]Dongpo Xu
, Jinlan Liu, Yinghua Lu, Jun Kong, Danilo P. Mandic:
Last-iterate convergence analysis of stochastic momentum methods for neural networks. CoRR abs/2205.14811 (2022) - [i2]Yanni Zhang, Qiang Li, Miao Qi, Di Liu, Jun Kong, Jianzhong Wang
:
Multi-scale frequency separation network for image deblurring. CoRR abs/2206.00798 (2022) - 2021
- [j71]Zhangyu Meng, Jun Kong, Juan Li
:
Utilizing binary code to improve usability of pressure-based authentication. Comput. Secur. 103: 102187 (2021) - [j70]Xin Wang, Tianyi Liang, Juan Li
, Souradip Roy
, Vikram Pandey, Yang Du, Jun Kong:
Artificial Intelligence-Empowered Chatbot for Effective COVID-19 Information Delivery to Older Adults. Int. J. E Health Medical Commun. 12(6): 1-18 (2021) - [j69]Juechen Yang
, Jun Kong, Chunying Zhao:
A Smartphone-Based Cursor Position System in Cross-Device Interaction Using Machine Learning Techniques. Sensors 21(5): 1665 (2021) - [j68]Yanni Zhang
, Yiming Liu
, Qiang Li, Jianzhong Wang
, Miao Qi, Hui Sun, Hui Xu, Jun Kong:
A Lightweight Fusion Distillation Network for Image Deblurring and Deraining. Sensors 21(16): 5312 (2021) - [j67]Di Liu, Hui Xu, Jianzhong Wang
, Yinghua Lu, Jun Kong, Miao Qi:
Adaptive Attention Memory Graph Convolutional Networks for Skeleton-Based Action Recognition. Sensors 21(20): 6761 (2021) - [c79]Yanni Zhang, Yiming Liu, Qiang Li, Miao Qi, Dahong Xu, Jun Kong, Jianzhong Wang
:
Image Deblurring based on Lightweight Multi-Information Fusion Network. ICIP 2021: 1724-1728 - [i1]Yanni Zhang, Yiming Liu, Qiang Li, Miao Qi, Dahong Xu, Jun Kong, Jianzhong Wang:
Image deblurring based on lightweight multi-information fusion network. CoRR abs/2101.05403 (2021) - 2020
- [j66]Shuqing Liu
, Tianyi Liang, Shuai Shao, Jun Kong:
Evaluating Localized MOOCs: The Role of Culture on Interface Design and User Experience. IEEE Access 8: 107927-107940 (2020) - [j65]Xiaoli Liu
, Jianzhong Wang
, Fulong Ren, Jun Kong
:
Group Guided Fused Laplacian Sparse Group Lasso for Modeling Alzheimer's Disease Progression. Comput. Math. Methods Medicine 2020: 4036560:1-4036560:23 (2020) - [j64]Fucong Liu, Tongzhou Zhang, Caixia Zheng
, Yuanyuan Cheng, Xiaoli Liu, Miao Qi, Jun Kong, Jianzhong Wang
:
An Intelligent Multi-View Active Learning Method Based on a Double-Branch Network. Entropy 22(8): 901 (2020) - [j63]Zheng Huang, Jun Kong:
A Toolkit for Prototyping Tabletop-Centric Cross-Device Interaction. Int. J. Hum. Comput. Interact. 36(6): 536-552 (2020) - [j62]Chunying Zhao, Cong Chen, Kang Zhang, Jun Kong:
ViBERT: Visual Behavior Regression Testing. J. Vis. Lang. Sentient Syst. 2020(2): 31-41 (2020) - [j61]Jianyu Chen, Jun Kong, Hui Sun, Hui Xu, Xiaoli Liu, Yinghua Lu, Caixia Zheng
:
Spatiotemporal Interaction Residual Networks with Pseudo3D for Video Action Recognition. Sensors 20(11): 3126 (2020) - [j60]Yugen Yi
, Jianzhong Wang
, Wei Zhou
, Caixia Zheng
, Jun Kong, Shaojie Qiao
:
Non-Negative Matrix Factorization With Locality Constrained Adaptive Graph. IEEE Trans. Circuits Syst. Video Technol. 30(2): 427-441 (2020)
2010 – 2019
- 2019
- [j59]Caixia Zheng
, Jianyu Chen, Jun Kong, Yugen Yi
, Yinghua Lu, Jianzhong Wang
, Chong Liu:
Scene Recognition via Semi-Supervised Multi-Feature Regression. IEEE Access 7: 121612-121628 (2019) - [j58]Zeqiang Fu, Xiaofeng Wang, Jun Kong:
高性能网络安全告警信息的关联分析方法 (High-performance Association Analysis Method for Network Security Alarm Information). 计算机科学 46(5): 116-121 (2019) - [j57]Xiaoli Liu
, Peng Cao, Jianzhong Wang
, Jun Kong, Dazhe Zhao:
Fused Group Lasso Regularized Multi-Task Feature Learning and Its Application to the Cognitive Performance Prediction of Alzheimer's Disease. Neuroinformatics 17(2): 271-294 (2019) - [j56]Yugen Yi
, Jianzhong Wang
, Wei Zhou, Yuming Fang, Jun Kong, Yinghua Lu:
Joint graph optimization and projection learning for dimensionality reduction. Pattern Recognit. 92: 258-273 (2019) - [c78]Bikesh Maharjan, Juan Li, Jun Kong, Cui Tao:
Alexa, What Should I Eat? : A Personalized Virtual Nutrition Coach for Native American Diabetes Patients Using Amazon's Smart Speaker Technology. HealthCom 2019: 1-6 - 2018
- [j55]Caixia Zheng
, Yugen Yi
, Miao Qi, Fucong Liu, Chao Bi, Jianzhong Wang
, Jun Kong:
Multicriteria-Based Active Discriminative Dictionary Learning for Scene Recognition. IEEE Access 6: 4416-4426 (2018) - [j54]Caixia Zheng
, Rui Zhao, Fucong Liu, Jun Kong, Jianzhong Wang
, Chao Bi, Yugen Yi
:
Dimensionality Reduction via Multiple Locality-Constrained Graph Optimization. IEEE Access 6: 54479-54494 (2018) - [j53]Tuo Zhang, Jun Kong, Ke Jing, Hanbo Chen, Xi Jiang
, Longchuan Li, Lei Guo, Jianfeng Lu
, Xiaoping Hu
, Tianming Liu:
Optimization of macaque brain DMRI connectome by neuron tracing and myelin stain data. Comput. Medical Imaging Graph. 69: 9-20 (2018) - [j52]Xiaoqin Zeng, Yufeng Liu, Zhan Shi, Yingfeng Wang, Yang Zou, Jun Kong, Kang Zhang:
An Edge-based Graph Grammar Formalism and its Support System. J. Vis. Lang. Sentient Syst. 4: 11-19 (2018) - [j51]Yufeng Liu, Kang Zhang, Jun Kong, Yang Zou, Xiaoqin Zeng:
Spatial specification and reasoning using grammars: from theory to application. Spatial Cogn. Comput. 18(4): 315-340 (2018) - [c77]Yufeng Liu, Zhan Shi, Yingfeng Wang, Yang Zou, Jun Kong, Kang Zhang, Xiaoqin Zeng:
An Edge-based Graph Grammar Formalism and its Support System. DMSVIVA 2018: 101-108 - 2017
- [j50]Long Yu
, Zhiyin Wang, Shengwei Tian, Feiyue Ye, Jianli Ding, Jun Kong:
Convolutional Neural Networks for Water Body Extraction from Landsat Imagery. Int. J. Comput. Intell. Appl. 16(1): 1750001:1-1750001:12 (2017) - [j49]Jianzhong Wang
, Rui Zhao, Yang Wang, Caixia Zheng, Jun Kong, Yugen Yi
:
Locality constrained Graph Optimization for Dimensionality Reduction. Neurocomputing 245: 55-67 (2017) - [j48]Simone A. Ludwig, Jun Kong:
Investigation of different classifiers and channel configurations of a mobile P300-based brain-computer interface. Medical Biol. Eng. Comput. 55(12): 2143-2154 (2017) - [j47]Di Wang, Chunying Zhao, Jun Kong:
The Fusion of an Ultrasonic and Spatially Aware System in a Mobile-Interaction Device. Symmetry 9(8): 137 (2017) - [j46]Jie Li, Zhao Xiao, Jun Kong:
A viewpoint based approach to the visual exploration of trajectory. J. Vis. Lang. Comput. 41: 41-53 (2017) - [j45]Zheng Huang, Jed Limke, Jun Kong:
Investigating one-handed and two-handed inter-device interaction. J. Vis. Lang. Comput. 42: 1-12 (2017) - [c76]Arnaldo Horta, Neil Joshi, Michael J. Pekala, Katia D. Pacheco, Jun Kong, Neil M. Bressler, David E. Freund, Philippe Burlina:
A Hybrid Approach for Incorporating Deep Visual Features and Side Channel Information with Applications to AMD Detection. ICMLA 2017: 716-720 - 2016
- [j44]Amin Roudaki, Jun Kong, Kang Zhang
:
Specification and discovery of web patterns: a graph grammar approach. Inf. Sci. 328: 528-545 (2016) - [j43]Nan Yu, Jun Kong:
User experience with web browsing on small screens: Experimental investigations of mobile-page interface design and homepage design for news websites. Inf. Sci. 330: 427-443 (2016) - [j42]Ke Zhang, Fan Zhang, Jia Lu, Yinghua Lu, Jun Kong, Ming Zhang:
Local structure co-occurrence pattern for image retrieval. J. Electronic Imaging 25(2): 023030 (2016) - [j41]Veera V. S. M. Chintapalli, Wenyuan Tao, Zhao-Peng Meng, Kang Zhang, Jun Kong, Yue Ge:
A Comparative Study of Spreadsheet Applications on Mobile Devices. Mob. Inf. Syst. 2016: 9816152:1-9816152:10 (2016) - [j40]Amin Roudaki, Jun Kong, Shane Reetz:
SmartCamera: a low-cost and intelligent camera management system. Multim. Tools Appl. 75(13): 7831-7854 (2016) - [c75]Sahar Harati, Andrea Crowell, Helen S. Mayberg, Jun Kong, Shamim Nemati:
Discriminating clinical phases of recovery from major depressive disorder using the dynamics of facial expression. EMBC 2016: 2254-2257 - [c74]Juan Li, Jun Kong:
Cell phone-based diabetes self-management and social networking system for American Indians. HealthCom 2016: 1-6 - [c73]Zheng Huang, Jed Limke, Jun Kong:
A Comparative Study on Inter-Device Interaction: One-Handed Interaction VS Two-Handed Interaction. VINCI 2016: 67-74 - 2015
- [j39]Yugen Yi
, Yanjiao Shi, Huijie Zhang, Jianzhong Wang
, Jun Kong:
Label propagation based semi-supervised non-negative matrix factorization for feature extraction. Neurocomputing 149: 1021-1037 (2015) - [j38]Yugen Yi
, Chao Bi, Xiaohui Li, Jianzhong Wang
, Jun Kong:
Semi-supervised local ridge regression for local matching based face recognition. Neurocomputing 167: 132-146 (2015) - [j37]Yugen Yi
, Baoxue Zhang, Jun Kong, Jianzhong Wang
:
An improved locality sensitive discriminant analysis approach for feature extraction. Multim. Tools Appl. 74(1): 85-104 (2015) - [j36]Qasem T. Obeidat
, Tom A. Campbell
, Jun Kong:
Introducing the Edges Paradigm: A P300 Brain-Computer Interface for Spelling Written Words. IEEE Trans. Hum. Mach. Syst. 45(6): 727-738 (2015) - [j35]Yanjiao Shi, Yugen Yi
, Hexin Yan, Jiangyan Dai, Ming Zhang, Jun Kong:
Region contrast and supervised locality-preserving projection-based saliency detection. Vis. Comput. 31(9): 1191-1205 (2015) - [j34]Ali Roudaki, Jun Kong, Nan Yu:
A classification of web browsing on mobile devices. J. Vis. Lang. Comput. 26: 82-98 (2015) - [c72]Kai Liao, Bauke de Vries, Jun Kong, Kang Zhang:
Pattern, Cognition and Spatial Information Processing - Representations of the Spatial Layout of Architectural Design with Spatial-Semantic Analytics. CAAD Futures 2015: 547-562 - [c71]Tuo Zhang, Jun Kong, Ke Jing, Hanbo Chen, Xi Jiang
, Longchuan Li, Lei Guo, Jianfeng Lu, Xiaoping Hu
, Tianming Liu:
Multi-scale and Multimodal Fusion of Tract-Tracing, Myelin Stain and DTI-derived Fibers in Macaque Brains. MICCAI (2) 2015: 246-254 - 2014
- [j33]Yugen Yi
, Wei Zhou, Jianzhong Wang
, Yanjiao Shi, Jun Kong:
Face recognition using spatially smoothed discriminant structure-preserved projections. J. Electronic Imaging 23(2): 023012 (2014) - [j32]Yanjiao Shi, Yugen Yi, Ke Zhang, Jun Kong, Ming Zhang, Jianzhong Wang
:
Multiview saliency detection based on improved multimanifold ranking. J. Electronic Imaging 23(6): 061113 (2014) - [j31]Ming Zhang, Ke Zhang, Qinghe Feng
, Jianzhong Wang
, Jun Kong, Yinghua Lu:
A novel image retrieval method based on hybrid information descriptors. J. Vis. Commun. Image Represent. 25(7): 1574-1587 (2014) - [j30]Amin Roudaki, Jun Kong, Gursimran S. Walia, Ali Roudaki:
PhoneLens: A Low-Cost, Spatially Aware, Mobile-Interaction Device. IEEE Trans. Hum. Mach. Syst. 44(3): 301-314 (2014) - [j29]Ali Roudaki
, Jun Kong, Gursimran S. Walia, Zheng Huang:
A framework for bimanual inter-device interactions. J. Vis. Lang. Comput. 25(6): 727-737 (2014) - [j28]Krishna C. Chinthakayala, Chunying Zhao, Jun Kong, Kang Zhang:
A comparative study of three social networking websites. World Wide Web 17(6): 1233-1259 (2014) - [c70]Ali Roudaki, Jun Kong, Gursimran S. Walia:
A Framework for Bimanual Inter-Device Interactions. DMS 2014: 113-120 - 2013
- [j27]Jun Kong, Pei Xin
, Cheng-Ji Shen, Zhi-Yao Song, Ling Li
:
A high-resolution method for the depth-integrated solute transport equation based on an unstructured mesh. Environ. Model. Softw. 40: 109-127 (2013) - [j26]Ankita Kohli, Chunying Zhao, Jun Kong:
Automatic Usability Evaluation of Mobile Web Pages with XML. Int. J. Handheld Comput. Res. 4(3): 19-40 (2013) - [j25]Jianzhong Wang
, Lishan Wu, Jun Kong, Yuxin Li, Baoxue Zhang:
Maximum weight and minimum redundancy: A novel framework for feature subset selection. Pattern Recognit. 46(6): 1616-1627 (2013) - [c69]Jun Kong, Kan Zhang, Xuefeng Chen:
Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers. HCI (22) 2013: 38-44 - [c68]Gang Hou, Ke Zhang, Xiaoxue Zhang, Jun Kong, Ming Zhang:
A Novel Image Retrieval Method Based on Mutual Information Descriptors. ICIC (2) 2013: 435-442 - [c67]Qasem T. Obeidat
, Tom A. Campbell
, Jun Kong:
The zigzag paradigm: a new P300-based brain computer interface. ICMI 2013: 205-212 - 2012
- [j24]Yaswanth Potla, Ramakanth Annadi, Jun Kong, Gursimran S. Walia, Kendall E. Nygard:
Adapting Web Page Tables on Mobile Devices. Int. J. Handheld Comput. Res. 3(1): 1-22 (2012) - [j23]Jun Kong, Omer Barkol, Ruth Bergman, Ayelet Pnueli, Sagi Schein, Kang Zhang, Chunying Zhao:
Web Interface Interpretation Using Graph Grammars. IEEE Trans. Syst. Man Cybern. Part C 42(4): 590-602 (2012) - [j22]Hamed Ahmadi, Jun Kong:
User-centric adaptation of Web information for small screens. J. Vis. Lang. Comput. 23(1): 13-28 (2012) - [c66]Yuhong Jia, Xiaoxi Yu, Jiangyan Dai, Wanjun Hu, Jun Kong, Miao Qi:
A Novel Moving Cast Shadow Detection of Vehicles in Traffic Scene. IScIDE 2012: 115-124 - 2011
- [j21]Xiangjiu Che, Jun Kong, Jiangyan Dai, Zhanheng Gao, Miao Qi:
Content-based Image Hiding Method for Secure Network Biometric Verification. Int. J. Comput. Intell. Syst. 4(4): 596-605 (2011) - [j20]Jun Kong, W. Y. Zhang, Nan Yu, X. J. Xia:
Design of human-centric adaptive multimodal interfaces. Int. J. Hum. Comput. Stud. 69(12): 854-869 (2011) - [j19]Miao Qi, Jun Kong, Yinghua Lu, Ning Du, Zhiqiang Ma:
Content-Based Biometric Image Hiding Approach. Int. J. Pattern Recognit. Artif. Intell. 25(4): 565-581 (2011) - [j18]Jianzhong Wang
, Zhiqiang Ma, Baoxue Zhang, Miao Qi, Jun Kong:
A structure-preserved local matching approach for face recognition. Pattern Recognit. Lett. 32(3): 494-504 (2011) - [c65]Amin Roudaki, Jun Kong:
Graph Grammar Based Web Data Extraction. SEKE 2011: 373-378 - 2010
- [j17]Jun Kong, Dianxiang Xu, Xiaoqin Zeng:
Uml-Based Modeling and Analysis of Security Threats. Int. J. Softw. Eng. Knowl. Eng. 20(6): 875-897 (2010) - [j16]Jianzhong Wang
, Baoxue Zhang, Miao Qi, Jun Kong:
Linear discriminant projection embedding based on patches alignment. Image Vis. Comput. 28(12): 1624-1636 (2010) - [j15]Mei-Ling Shyu, Yu Cao, Ming Li, Jun Kong, Jie Bao:
Guest Editorial. J. Multim. 5(4): 299-301 (2010) - [j14]Miao Qi, Yinghua Lu, Ning Du, Yinan Zhang, Chengxi Wang, Jun Kong:
A novel image hiding approach based on correlation analysis for secure multimodal biometrics. J. Netw. Comput. Appl. 33(3): 247-257 (2010) - [j13]Jianzhong Wang
, Baoxue Zhang, Shuyan Wang, Miao Qi, Jun Kong:
An adaptively weighted sub-pattern locality preserving projection for face recognition. J. Netw. Comput. Appl. 33(3): 323-332 (2010) - [j12]Weiyi Zhang, Jun Kong:
Multi-Constrained QoS Routing for Distraction-free Service in Pervasive Environment. J. Next Gener. Inf. Technol. 1(2): 35-44 (2010) - [j11]Mei-Ling Shyu, Yu Cao, Jun Kong, Ming Li, Mathias Lux, Jie Bao:
Introduction to the special issue on "data semantics for multimedia systems". Multim. Tools Appl. 46(2-3): 147-154 (2010) - [j10]Chunying Zhao, Jun Kong, Kang Zhang:
Program Behavior Discovery and Verification: A Graph Grammar Approach. IEEE Trans. Software Eng. 36(3): 431-448 (2010) - [c64]Zhongxian Qu, Yan Hu, Huihui Sun, Jun Kong:
A Novel User-Specific Palmprint Verification Approach. FCST 2010: 161-165 - [c63]Jun Kong, Weiyi Zhang, Juan Li, Arjun G. Roy:
A Cross-Layer Design for Adaptive Multimodal Interfaces in Pervasive Computing. SEKE 2010: 726-731
2000 – 2009
- 2009
- [j9]Jun Kong, Kang Zhang, Jing Dong, Dianxiang Xu:
Specifying behavioral semantics of UML diagrams through graph transformations. J. Syst. Softw. 82(2): 292-306 (2009) - [c62]Weiyi Zhang, Jun Kong, Kendall E. Nygard, Ming Li:
Adaptive Configuration of Pervasive Computing System with QoS Consideration. CCNC 2009: 1-5 - [c61]Yinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong:
Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity. CIS (2) 2009: 330-334 - [c60]Lintian Ma, Shuyan Wang, Jianzhong Wang
, Baowei Fu, Jun Kong:
Relative Transformation with CamNN Applied to Isometric Embedding. ISCID (1) 2009: 6-10 - [c59]Na Luo, WeiWei Hu, Jin Zhang, Tao Fu, Jun Kong:
Applying Iterative Logistic Regression and Active Learning to Relevance Feedback in Image Retrieval System. NCM 2009: 1277-1282 - [c58]Sathish Pinagapani, Dianxiang Xu, Jun Kong:
A Comparative Study of Access Control Languages. SSIRI 2009: 407-412 - 2008
- [j8]Jun Kong, Fei Zhu, Jim Stalker, David J. Adams:
iMapper: a web application for the automated analysis and mapping of insertional mutagenesis sequence data against Ensembl genomes. Bioinform. 24(24): 2923-2925 (2008) - [j7]Jianzhong Wang
, Jun Kong, Yinghua Lu, Miao Qi, Baoxue Zhang:
A modified FCM algorithm for MRI brain image segmentation using both local and non-local spatial constraints. Comput. Medical Imaging Graph. 32(8): 685-698 (2008) - [j6]Jun Kong, Yinghua Lu, Shuhua Wang, Miao Qi, Hong-Zhi Li:
A two stage neural network-based personal identification system using handprint. Neurocomputing 71(4-6): 641-647 (2008) - [j5]Neil D. Rawlings
, Fraser R. Morton
, Chai Yin Kok, Jun Kong, Alan J. Barrett
:
MEROPS: the peptidase database. Nucleic Acids Res. 36(Database-Issue): 320-325 (2008) - [c57]Hamed Ahmadi, Jun Kong:
Efficient web browsing on small screens. AVI 2008: 23-30 - [c56]Jianzhong Wang
, Lili Dou, Na Che, Di Liu, Baoxue Zhang, Jun Kong:
Local-based fuzzy clustering for segmentation of MR brain images. BIBE 2008: 1-5 - [c55]Jianzhong Wang
, Di Liu, Lili Dou, Baoxue Zhang, Jun Kong, Yinghua Lu:
Graph theory based algorithm for magnetic resonance brain images segmentation. BIBE 2008: 1-5 - [c54]Jun Kong, Dianxiang Xu:
A UML-Based Framework for Design and Analysis of Dependable Software. COMPSAC 2008: 28-31 - [c53]Miao Qi, Yinghua Lu, Jinsong Li, Xiaolu Li, Jun Kong:
User-Specific Iris Authentication Based on Feature Selection. CSSE (1) 2008: 1040-1043 - [c52]Yinghua Lu, Yao Fu, Jinsong Li, Xiaolu Li, Jun Kong:
A Multi-modal Authentication Method Based on Human Face and Palmprint. FGCN (2) 2008: 193-196 - [c51]Lei Zhang, Jun Kong, Xiaoyun Zeng, Jiayue Ren:
Plant Species Identification Based on Neural Network. ICNC (5) 2008: 90-94 - [c50]Jun Kong, Kevin L. Ates, Kang Zhang, Yan Gu:
Adaptive Mobile Interfaces through Grammar Induction. ICTAI (1) 2008: 133-140 - [c49]Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang:
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces. ICTAI (2) 2008: 395-402 - [c48]Yan Jin, Miao Qi, Yinghua Lu, Yao Fu, Jun Kong:
Palmprint verification based on genetic algorithm. ISKE 2008: 471-475 - [c47]Xuerong Feng, Chunlei Liu, Jun Kong:
Sorting on Partially Connected Mesh Networks. ITNG 2008: 235-240 - [c46]Jed Limke, Jun Kong, Jing Dong:
Adaptation in a Pervasive Computing Environment. SETP 2008: 145-155 - [p1]Kang Zhang, Jun Kong, Jiannong Cao:
Visual Software Engineering. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j4]Chunying Zhao, Jun Kong, Jing Dong, Kang Zhang:
Pattern-based design evolution using graph transformation. J. Vis. Lang. Comput. 18(4): 378-398 (2007) - [c45]Jun Kong, Wenjing Lu, Jianzhong Wang
, Na Che, Yinghua Lu:
A Modified Fuzzy Kohonen's Competitive Learning Algorithms Incorporating Local Information for MR Image Segmentation. BIBE 2007: 647-653 - [c44]Jun Kong, Ying Zheng, Yinghua Lu, Baoxue Zhang:
A Novel Background Extraction and Updating Algorithm for Vehicle Detection and Tracking. FSKD (3) 2007: 464-468 - [c43]Chunying Zhao, Jun Kong, Kang Zhang:
Design Pattern Evolution and Verification Using Graph Transformation. HICSS 2007: 290 - [c42]Miao Qi, Yinghua Lu, Hong-Zhi Li, Rujuan Wang, Jun Kong:
A Novel Hand-Based Personal Identification Approach. ICANNGA (2) 2007: 309-317 - [c41]Jun Kong, Hong-Zhi Li, Yinghua Lu, Miao Qi, Shuhua Wang:
Hand-Based Personal Identification Using K-Means Clustering and Modified Zernike Moments. ICNC (2) 2007: 651-655 - [c40]Jun Kong, Na Che, Jianzhong Wang, Yinghua Lu, Wenjing Lu, Baoxue Zhang:
Local-based Fuzzy Clustering Algorithm for Magnetic Resonance Brain Images Corrupted by Intensity Heterogeneity. IMSCCS 2007: 150-157 - [c39]Zhiqiang Ma, Miao Qi, Haifeng Kang, Shuhua Wang, Jun Kong:
Iris Verification Using Wavelet Moments and Neural Network. LSMS (2) 2007: 218-226 - [c38]Yinghua Lu, Ying Zheng, Xianliang Tong, Yanfen Zhang, Jun Kong:
A Novel Object Tracking Algorithm Based on Discrete Wavelet Transform and Extended Kalman Filter. LSMS (1) 2007: 551-560 - [c37]Jun Kong, Yanfen Zhang, Xiangbo Meng, Ying Zheng, Yinghua Lu:
A Scalable Secret Image Sharing Method Based on Discrete Wavelet Transform. LSMS (1) 2007: 736-745 - 2006
- [j3]Jun Kong, Kang Zhang, Xiaoqin Zeng:
Spatial graph grammars for graphical user interfaces. ACM Trans. Comput. Hum. Interact. 13(2): 268-307 (2006) - [j2]Guang-Lei Song, Jun Kong, Kang Zhang:
AutoGen: Easing model management through two levels of abstraction. J. Vis. Lang. Comput. 17(6): 508-527 (2006) - [c36]Jun Kong, Huijie Xin, Yinghua Lu, Bingbing Li, Yanwen Li:
Vehicle Tracking and Traffic Parameter Extraction Based on Discrete Wavelet Transform. Australian Conference on Artificial Intelligence 2006: 482-490 - [c35]Yinghua Lu, Qiushi Zhao, Jun Kong, Changhua Tang, Yanwen Li:
A Two-Stage Region-Based Image Retrieval Approach Using Combined Color and Texture Features. Australian Conference on Artificial Intelligence 2006: 1010-1014 - [c34]Yinghua Lu, Huijie Xin, Jun Kong, Bingbing Li, Yan Wang:
Shadow Removal Based on Shadow Direction and Shadow Attributes. CIMCA/IAWTIC 2006: 37 - [c33]Jun Kong, Guang-Lei Song, Kang Zhang, Mao Lin Huang
:
A Collaborative Framework for Designers and Developers of Software-Intensive Systems. CSCWD 2006: 306-311 - [c32]Yinghua Lu, Jianzhong Wang
, Jun Kong, Baoxue Zhang, Jingdan Zhang:
An Integrated Algorithm for MRI Brain Images Segmentation. CVAMIA 2006: 132-142 - [c31]Wei Wu, Feng Li, Jun Kong, Lichang Hou, Bingdui Zhu:
A Bottom-Up OCR System for Mathematical Formulas Recognition. ICIC (1) 2006: 274-279 - [c30]Jialing Han, Jun Kong, Yinghua Lu, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks. ICONIP (3) 2006: 225-233 - [c29]Yinghua Lu, Yuru Wang, Jun Kong, Longkui Jiang:
A Novel Automated Hand-Based Personal Identification. IWCIA 2006: 404-414 - [c28]Jianzhong Wang
, Jun Kong, Yinghua Lu, Jingdan Zhang, Baoxue Zhang:
Segmentation of 3-D MRI Brain Images Using Information Propagation. MIAR 2006: 348-355 - [c27]Jun Kong, Miao Qi, Yinghua Lu, Xiaole Liu, Yanjun Zhou:
A Fast and Robust Personal Identification Approach Using Handprint. MRCS 2006: 175-182 - [c26]Yinghua Lu, Jialing Han, Jun Kong, Yulong Yang, Gang Hou:
A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks. RSCTC 2006: 806-814 - 2005
- [j1]Kang Zhang, Jun Kong, Mei Kang Qiu, Guang-Lei Song:
Multimedia layout adaptation through grammatical specifications. Multim. Syst. 10(3): 245-260 (2005) - [c25]Jun Kong, Xinyue Liu, Yinghua Lu, Xiaofeng Zhou, Qiushi Zhao:
Robust License Plate Segmentation Method Based on Texture Features and Radon Transform. Australian Conference on Artificial Intelligence 2005: 510-519 - [c24]Yinghua Lu, Wei Wang, Jun Kong, Jialing Han, Gang Hou:
Joint Spatial and Frequency Domains Watermarking Algorithm Based on Wavelet Packets. Australian Conference on Artificial Intelligence 2005: 934-937 - [c23]Yinghua Lu, Lijie Yu, Jun Kong, Changhua Tang:
A Novel License Plate Location Method Based on Neural Network and Saturation Information. Australian Conference on Artificial Intelligence 2005: 1037-1040 - [c22]Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong:
Secure Model Management Operations for the Web. DBSec 2005: 237-251 - [c21]Pu Liu, Sheldon X.-D. Tan, Hang Li, Zhenyu Qi, Jun Kong, Bruce McGaughy, Lei He:
An efficient method for terminal reduction of interconnect circuits considering delay variations. ICCAD 2005: 821-826 - [c20]Jun Kong, Kang Zhang, Jing Dong:
Grammar-Specified Model-Driven Architectures. ICECCS 2005: 24-25 - [c19]Kang Zhang, Guang-Lei Song, Jun Kong:
Interoperating XML-style of digital artifacts for information reuse. IRI 2005: 126-131 - [c18]Jun Kong, Jingdan Zhang, Yinghua Lu, Jianzhong Wang
, Yanjun Zhou:
A Novel Approach for Adaptive Unsupervised Segmentation of MRI Brain Images. MICAI 2005: 918-927 - [c17]Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song:
A Generative Style-driven Framework for Software Architecture Design. SEW 2005: 173-182 - [c16]Xiaoqin Zeng, Kang Zhang, Jun Kong, Guang-Lei Song:
RGG+: An Enhancement to the Reserved Graph Grammar Formalism. VL/HCC 2005: 272-274 - 2004
- [c15]Jun Kong, Baoxue Zhang, Wanwu Guo:
Analytical Test on Effectiveness of MCDF Operations. International Conference on Computational Science 2004: 388-395 - [c14]Jun Kong, Dongguang Li, Chunnong Zhao:
An Automatic Analysis System for Firearm Identification Based on Ballistics Projectile. Rough Sets and Current Trends in Computing 2004: 653-658 - [c13]Kang Zhang, Guang-Lei Song, Jun Kong:
Rapid Software Prototyping Using Visual Language Techniques. IEEE International Workshop on Rapid System Prototyping 2004: 119-126 - [c12]Guang-Lei Song, Kang Zhang, Jun Kong:
Model Management Through Graph Transformation. VL/HCC 2004: 75-82 - [c11]Jun Kong, Kang Zhang:
Parsing Spatial Graph Grammars. VL/HCC 2004: 99-101 - [c10]Jun Kong, Kang Zhang:
On a Spatial Graph Grammar Formalism. VL/HCC 2004: 102-104 - [c9]Jun Kong:
Browsing Web Through Audio. VL/HCC 2004: 279-280 - [c8]Guang-Lei Song, Kang Zhang, Raymond K. Wong, Jun Kong:
Management of Web Data Models Based on Graph Transformation. Web Intelligence 2004: 398-404 - 2003
- [c7]Jun Kong, Kang Zhang, Mao Lin Huang:
Application-oriented Spatial Graph Grammars. Applied Informatics 2003: 210-215 - [c6]Jun Kong, D. G. Li, A. C. Watson:
A Firearm Identification System Based on Neural Network. Australian Conference on Artificial Intelligence 2003: 315-326 - [c5]Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song:
A Graph Grammar Approach to Software Architecture Verification and Transformation. COMPSAC 2003: 492- - [c4]Jun Kong, Kang Zhang:
Toward a Graphical Approach to Multimedia Document Design. ICDCS Workshops 2003: 666-671 - [c3]Jun Kong, Meikang Qiu, Kang Zhang:
Authoring multimedia documents through grammatical specifications. ICME 2003: 629-632 - [c2]Mei Kang Qiu, Guang-Lei Song, Jun Kong, Kang Zhang:
Spatial graph grammars for web information transformation. HCC 2003: 84-91 - [c1]Jun Kong, Kang Mang:
Graph-based Consistency Checking in Spatial Information System. HCC 2003: 153-160
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-15 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint