default search action
Jianguo Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jianguo Chen 0001 — Sun Yat-Sen University, Guangzhou, China
- Jianguo Chen 0002 — University of Virginia, Charlottesville, VA, USA
- Jianguo Chen 0003 — China University of Geosciences, Wuhan, China
- Jianguo Chen 0004 — Hebei Seismological Observatories, Shijiazhuang, China
- Jianguo Chen 0005 — Tsinghua University, Beijing, China
- Jianguo Chen 0006 (aka: Jian-Guo Chen 0006) — National Taichung Institute of Technology, Taichung, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Hongjian Xu, Longlong Liao, Xinqi Liu, Shuguang Chen, Jianguo Chen, Zhixuan Liang, Yuanlong Yu:
Fault-tolerant deep learning inference on CPU-GPU integrated edge devices with TEEs. Future Gener. Comput. Syst. 161: 404-414 (2024) - [j19]Xiangyuan Gu, Jianguo Chen, Guoqiang Wu, Kun Wang, Jiaxing Wang:
Feature subset selection algorithm based on symmetric uncertainty and interaction factor. Multim. Tools Appl. 83(4): 11247-11260 (2024) - [c14]Huazhen Wang, Huan Wang, Jianguo Chen, Shiyue Zhu, Hao Zhou, Yifei Zhao:
Communication-Oriented Automatic Assessment System for Accented Spoken Chinese in Read-Aloud Tasks. ICASSP 2024: 11891-11895 - [c13]Yu Zhang, Yanqing Song, Jianguo Chen, Long Chen:
Generative Adversarial Network for Enhancement Network Security Log Detection. ICIC (8) 2024: 381-390 - 2023
- [j18]Xiaowei Liu, Yikun Hu, Jianguo Chen:
Hybrid CNN-Transformer model for medical image segmentation with pyramid convolution and multi-layer perceptron. Biomed. Signal Process. Control. 86(Part C): 105331 (2023) - [j17]Haiping Wang, Yuan Liu, Qingyong Hu, Bing Wang, Jianguo Chen, Zhen Dong, Yulan Guo, Wenping Wang, Bisheng Yang:
RoReg: Pairwise Point Cloud Registration With Oriented Descriptors and Local Rotations. IEEE Trans. Pattern Anal. Mach. Intell. 45(8): 10376-10393 (2023) - [j16]Meng Yang, Yubao Qiu, Lin Huang, Maoce Cheng, Jianguo Chen, Bin Cheng, Zhengxin Jiang:
Changes in Sea Surface Temperature and Sea Ice Concentration in the Arctic Ocean over the Past Two Decades. Remote. Sens. 15(4): 1095 (2023) - [i1]Jianguo Chen, Jinlong Lei, Hongsheng Qi, Yiguang Hong:
Online Parameter Identification of Generalized Non-cooperative Game. CoRR abs/2310.09511 (2023) - 2022
- [j15]Chong Xu, Xi Chen, Jianguo Chen, Debao Chen:
Exploring the Impact of Floating Population with Different Household Registration on Theft. ISPRS Int. J. Geo Inf. 11(8): 443 (2022) - 2021
- [j14]Haitao Dong, Mingchen Xiao, Zhaojun Li, Shuaitao Zhang, Jianguo Chen:
FPGA-Based High-Performance Double-Loop PDF Control Strategy for PMSM. IEEE Access 9: 59822-59834 (2021) - [j13]Saishang Zhong, Zhenzhen Song, Zheng Liu, Zhong Xie, Jianguo Chen, Lu Liu, Renjie Chen:
Shape-aware Mesh Normal Filtering. Comput. Aided Des. 140: 103088 (2021) - [j12]Saishang Zhong, Mingqiang Guo, Ruina Lv, Jianguo Chen, Zhong Xie, Zheng Liu:
A Robust Rigid Registration Framework of 3D Indoor Scene Point Clouds Based on RGB-D Information. Remote. Sens. 13(23): 4755 (2021) - 2020
- [j11]Jianguo Chen, Ahmad Salah:
Editorial introduction: special issue on advances in parallel and distributed computing for neural computing. Neural Comput. Appl. 32(10): 5531-5533 (2020) - [j10]Yina Guo, Jianguo Chen, Xiaowen Ren, Anhong Wang, Wenwu Wang:
Joint Raindrop and Haze Removal From a Single Image. IEEE Trans. Image Process. 29: 9508-9519 (2020)
2010 – 2019
- 2019
- [j9]Zhenhua Gan, Nianyin Zeng, Fumin Zou, Jianguo Chen, Min Du, Lyu-Chao Liao, Han Li, Yudong Zhang:
Multilevel Segmentation Optimized by Physical Information for Gridding of Microarray Images. IEEE Access 7: 32146-32153 (2019) - [j8]Jianguo Chen, X. Q. Xu, Y. A. Lei:
Extension of Landau-fluid closure to weakly collisional plasma regime. Comput. Phys. Commun. 236: 128-134 (2019) - 2018
- [j7]Dan Cui, Charles Shen, Feniosky Peña-Mora, Jianguo Chen:
Cascading failures to attack on edges in interdependent networks. Int. J. Wirel. Mob. Comput. 14(3): 241-249 (2018) - [j6]Dan Cui, Jianguo Chen:
Gray-information-based robustness of interdependent networks under attack on edges. Int. J. Wirel. Mob. Comput. 15(4): 366-373 (2018) - [c12]Jianguo Chen, Wai K. Yeap, Huijuan Lu, Hangxia Zhou, Yongxia Zhou:
Trust Model and Anti-Attack Analysis for Social Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1948-1955 - 2017
- [c11]Binxu Zhai, Jianguo Chen:
Research on the forecasting of Air Quality Index (AQI) based on FS-GA-BPNN: A case study of Beijing, China. ISCRAM 2017 - 2016
- [c10]Yiting Zheng, Jianguo Chen, Wenjie Tang, Jiaxiang Xu:
Research on Target Diversity and Risk Analysis Model of Terrorist Attack. ISCRAM 2016 - 2015
- [j5]Ran Liu, Xiaoqun Yuan, Jie Xu, Jianguo Chen, Yuanxiang Zeng, Meng Cao, Jinhong Liu, Lifang Xu, Qing Fang:
A novel server selection approach for mobile cloud streaming service. Simul. Model. Pract. Theory 50: 72-82 (2015) - 2010
- [j4]Xu Xiang, Jianguo Chen:
A Secure Routing Protocol for Peer-to-Peer Network. J. Convergence Inf. Technol. 5(4): 75-83 (2010) - [j3]Jianguo Chen, Stefan D. Bruda:
An Efficient Feedback-based Trust Model for Pervasive Computing. J. Digit. Content Technol. its Appl. 4(7): 215-225 (2010) - [c9]Jianguo Chen, Xiaoning Jiang:
Trust-Based Robust Mechanism in Peer-to-peer Computing. ICEE 2010: 1687-1690 - [c8]Jianguo Chen, Zhongshan Song, Bojin Zheng, Fan Zhao, Zhuofu Yao:
A Multi-objective Optimization Evolutionary Algorithm with Better Performances on Multiple Indicators. ISICA (2) 2010: 47-56 - [c7]Fan Zhao, Zhongshan Song, Bojin Zheng, Jianguo Chen:
A New Multi-objective Optimization Evolutionary Algorithm Based on Geometrical Pareto Selection and Double Neighbored Crossover. ISICA (2) 2010: 68-78
2000 – 2009
- 2008
- [c6]Jianguo Chen, Hangxia Zhou, Stefan D. Bruda:
Combining Model Checking and Testing for Software Analysis. CSSE (2) 2008: 206-209 - [c5]Huijuan Lu, Jianguo Chen, Wei Wei:
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. ISECS 2008: 482-487 - 2007
- [c4]Fengtao Wang, Jianguo Chen, Xiaojiang Ma:
The Study of Feature Extraction Using Local Energy of Frequency Bands Based on Wavelet Packet Decomposition. ICNC (3) 2007: 167-170 - 2003
- [j2]Ling Zhang, Fanyuan Ma, Yunming Ye, Jianguo Chen:
CALA: A Web Analysis Algorithm Combined with Content Correlation Analysis Method. J. Comput. Sci. Technol. 18(1): 114-117 (2003) - 2001
- [c3]Dong Wei, Nirwan Ansari, Jianguo Chen:
A compressed and dynamic-range-based expression of timestamp and period for timestamp-based schedulers. GLOBECOM 2001: 2353-2357 - [c2]Dong Wei, Jianguo Chen, Nirwan Ansari:
An efficient expression of timestamp and period in packet-based and cell-based schedulers. ICC 2001: 95-99
1990 – 1999
- 1998
- [j1]Jianguo Chen, Nirwan Ansari:
Adaptive fusion of correlated local decisions. IEEE Trans. Syst. Man Cybern. Part C 28(2): 276-281 (1998) - 1997
- [c1]Lothar Breuer, Jianguo Chen, Huei-Er Yen:
Comparison of Several Algorithms Used for BMAP/G/1 Queues. MMB (Kurzbeiträge) 1997: 12-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint