default search action
Jiayao Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Dimeng Zhang, Jiayao Li, Zilong Chen, Yuntao Zou:
Efficient image generation with Contour Wavelet Diffusion. Comput. Graph. 124: 104087 (2024) - [j23]Zeqiu Chen, Kaiyi Zhao, Shulin Sun, Jiayao Li, Shufan Wang, Ruizhi Sun:
DMVSVDD: Multi-View Data Novelty Detection with Deep Autoencoding Support Vector Data Description. Expert Syst. Appl. 240: 122443 (2024) - [j22]Jiayao Li, Saihua Cai, Li Li, Ruizhi Sun, Gang Yuan, Rui Zhu:
MIT-FRNet: Modality-invariant temporal representation learning-based feature reconstruction network for missing modalities. Expert Syst. Appl. 249: 123655 (2024) - [j21]Jiayao Li, Rui Wang:
An anomaly detection method for weighted data based on feature association analysis. Int. Arab J. Inf. Technol. 21(1): 117-127 (2024) - [j20]Kaiyi Zhao, Pinle Qin, Saihua Cai, Ruizhi Sun, Zeqiu Chen, Jiayao Li:
A generalized weighted evidence fusion algorithm based on quantum modeling. Inf. Sci. 683: 121285 (2024) - [j19]Rui Wang, Jiayao Li:
An Anomaly Detection Approach Based on Bidirectional Temporal Convolutional Network and Multi-Head Attention Mechanism. Inf. Technol. Control. 53(1): 37-52 (2024) - [j18]Jiayao Li, Li Li, Ruizhi Sun, Gang Yuan, Shufan Wang, Shulin Sun:
MMAN-M2: Multiple multi-head attentions network based on encoder with missing modalities. Pattern Recognit. Lett. 177: 110-120 (2024) - [j17]Jiayao Li, Shunwu Zhou, Dong Guo, Dingzhu Hu, Yao Yao, Minghui Wu:
The Variation Characteristics of Stratospheric Circulation under the Interdecadal Variability of Antarctic Total Column Ozone in Early Austral Spring. Remote. Sens. 16(4): 619 (2024) - [j16]Qianxiang Cheng, Ting Lan, Zhanchuan Cai, Jiayao Li:
X-YOLO: An Efficient Detection Network of Dangerous Objects in X-Ray Baggage Images. IEEE Signal Process. Lett. 31: 2270-2274 (2024) - [c19]Rui Zhu, Yidan Yan, Jiayao Li, Ruizhi Sun:
A Multimodal Fusion Generation Network for High-quality MR Image Synthesis. CSCWD 2024: 2424-2429 - [c18]Baiqi Li, Zhiqiu Lin, Deepak Pathak, Jiayao Li, Yixin Fei, Kewen Wu, Xide Xia, Pengchuan Zhang, Graham Neubig, Deva Ramanan:
Evaluating and Improving Compositional Text-to-Visual Generation. CVPR Workshops 2024: 5290-5301 - [c17]Zhiqiu Lin, Deepak Pathak, Baiqi Li, Jiayao Li, Xide Xia, Graham Neubig, Pengchuan Zhang, Deva Ramanan:
Evaluating Text-to-Visual Generation with Image-to-Text Generation. ECCV (9) 2024: 366-384 - [c16]Fenghua Tang, Yifang Li, Ke Xu, Tingting Guo, Yuchen Li, Jiayao Li, Simin Ren, Zihan Niu, Xingyi Liu, Xinyi An, Yuxin Miao, Xinran Xu, Yiqi Chen, Lingjun Liu, Dan Qiu, Jiaqing Xiong, Bowen Li, Ruonan Huang, Mengmeng Xu, Yang Guo, Wei Liu:
Empowering Work-Life Harmony: Introducing a Porsche-Inspired Voice Digital Assistants Tailored for Women. HCI (33) 2024: 365-375 - [i4]Zhiqiu Lin, Deepak Pathak, Baiqi Li, Jiayao Li, Xide Xia, Graham Neubig, Pengchuan Zhang, Deva Ramanan:
Evaluating Text-to-Visual Generation with Image-to-Text Generation. CoRR abs/2404.01291 (2024) - [i3]Baiqi Li, Zhiqiu Lin, Deepak Pathak, Jiayao Li, Yixin Fei, Kewen Wu, Tiffany Ling, Xide Xia, Pengchuan Zhang, Graham Neubig, Deva Ramanan:
GenAI-Bench: Evaluating and Improving Compositional Text-to-Visual Generation. CoRR abs/2406.13743 (2024) - 2023
- [j15]Kaiyi Zhao, Zeqiu Chen, Li Li, Jiayao Li, Ruizhi Sun, Gang Yuan:
DPT: An importance-based decision probability transformation method for uncertain belief in evidence theory. Expert Syst. Appl. 213(Part): 119197 (2023) - [j14]Jiayao Li, Qiannan Wu, N. A. Li, Ruizhi Sun, Huiyu Mu, Kaiyi Zhao:
Incremental clustering algorithm based on representative points and covariance for large data. Int. J. Simul. Process. Model. 20(2): 113-124 (2023) - [j13]Li Li, Qihong Han, Jiayao Li, Zhanqi Cui:
Two-step multi-view data classification based on dynamic Graph-ELM. Pattern Recognit. Lett. 176: 236-243 (2023) - [j12]Jiayao Li, Wensheng Song, Bi Liu, Jiling Guo, Yunqiang Wu, Yunwei Li:
A Comparative Study of Current Harmonics and Switching Frequency With Different Pulse Patterns in Duty-Cycle-Based Model Predictive Current Control. IEEE Trans. Ind. Electron. 70(11): 10891-10901 (2023) - [j11]Kaiyi Zhao, Li Li, Zeqiu Chen, Jiayao Li, Ruizhi Sun, Gang Yuan:
An efficient parallelization method of Dempster-Shafer evidence theory based on CUDA. J. Supercomput. 79(4): 4582-4601 (2023) - [c15]Shufan Wang, Zeqiu Chen, Shulin Sun, Jiayao Li, Ruizhi Sun:
3D Object Detection Method Based on LiDAR Point Cloud Data. ChineseCSCW (2) 2023: 496-506 - [c14]Jie Chen, Zhiguo Zheng, Jiasheng Lu, Hongyan Lv, Jiayao Li:
Research and Implementation of Gesture Recognition Mechanical Arm System Based on LeapMotion. EITCE 2023: 1198-1202 - [c13]Cheng Huang, Jiayao Li, Hao Liu:
A Closed-Form Phase Difference Estimation Method for BLE Direction Finding using the Best Linear Unbiased Estimator. ICCT 2023: 1048-1052 - [c12]Mohammad Al-Fares, Virginia Beauregard, Kevin Grant, Angus Griffith, Jahangir Hasan, Chen Huang, Quan Leng, Jiayao Li, Alexander Lin, Zhuotao Liu, Ahmed Mansy, Bill Martinusen, Nikil Mehta, Jeffrey C. Mogul, Andrew Narver, Anshul Nigham, Melanie Obenberger, Sean Smith, Kurt Steinkraus, Sheng Sun, Edward Thiele, Amin Vahdat:
Change Management in Physical Network Lifecycle Automation. USENIX ATC 2023: 635-653 - [i2]Haoli Yin, Jiayao Li, Eva Schiller, Luke McDermott, Daniel Cummings:
GraFT: Gradual Fusion Transformer for Multimodal Re-Identification. CoRR abs/2310.16856 (2023) - 2022
- [j10]Jiayao Li, Samantha Ray, Vijay Rajanna, Tracy Hammond:
Evaluating the Performance of Machine Learning Algorithms in Gaze Gesture Recognition Systems. IEEE Access 10: 1020-1035 (2022) - [j9]Kaiyi Zhao, Li Li, Zeqiu Chen, Ruizhi Sun, Gang Yuan, Jiayao Li:
A survey: Optimization and applications of evidence fusion algorithm based on Dempster-Shafer theory. Appl. Soft Comput. 124: 109075 (2022) - [j8]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - [j7]Kaiyi Zhao, Li Li, Zeqiu Chen, Ruizhi Sun, Gang Yuan, Jiayao Li:
A New Multi-classifier Ensemble Algorithm Based on D-S Evidence Theory. Neural Process. Lett. 54(6): 5005-5021 (2022) - [c11]Tianyuan Zhang, Jiayao Li, Frédérick Bénaben:
A Simulation Framework Dedicated to Characterizing Risks and Cascading Effects in Collaborative Networks. PRO-VE 2022: 463-474 - 2021
- [j6]Wei Li, Jiayao Li, Dawu Gu, Chaoyun Li, Tianpei Cai:
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks. IEEE Trans. Inf. Forensics Secur. 16: 4224-4233 (2021) - [c10]Matthieu Lauras, Raphaël Oger, Jiayao Li, Benoît Montreuil, Markus Kohl, Andreas Habl, Julien Lesbegueries:
Towards a Collaborative and Open Supply Chain Management Operating Services Platform. PRO-VE 2021: 611-620 - [c9]Huiyu Mu, Ruizhi Sun, Gang Yuan, Jiayao Li, Miao Wang:
Crowd behavior detection in videos using statistical physics. ICDM (Workshops) 2021: 389-397 - 2020
- [j5]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [c8]Jin Dai, Jiayao Li:
News Influence Model Based on Neural Network. CyberC 2020: 301-308
2010 – 2019
- 2019
- [c7]Frédérick Bénaben, Jiayao Li, Ibrahim Koura, Benoît Montreuil, Matthieu Lauras, Wenxin Mu, Juanqiong Gou:
A Tentative Framework for Risk and Opportunity Detection in A Collaborative Environment Based on Data Interpretation. HICSS 2019: 1-10 - 2018
- [j4]Juanqiong Gou, Jiayao Li, Jing Xiang, Justin Zhang:
Innovating Service Delivery Through a Community-Based B2B2C Platform: A Case Study of Card Union. J. Cases Inf. Technol. 20(4): 17-31 (2018) - [j3]Yuanjie Li, Chunyi Peng, Haotian Deng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu, Xi Li:
Device-Customized Multi-Carrier Network Access on Commodity Smartphones. IEEE/ACM Trans. Netw. 26(6): 2542-2555 (2018) - [c6]Saihua Cai, Ruizhi Sun, Jiayao Li, Chao Deng, Sicong Li:
Abnormal Detecting over Data Stream Based on Maximal Pattern Mining Technology. ChineseCSCW 2018: 371-385 - [c5]Jiayao Li, Frédérick Bénaben, Juanqiong Gou, Wenxin Mu:
A Proposal for Risk Identification Approach in Collaborative Networks Considering Susceptibility to Danger. PRO-VE 2018: 74-84 - 2017
- [j2]Yuanjie Li, Chunyi Peng, Zengwen Yuan, Haotian Deng, Jiayao Li, Tao Wang:
MobileInsight: Analyzing Cellular Network Information on Smartphones. GetMobile Mob. Comput. Commun. 21(1): 39-42 (2017) - [c4]Jiayao Li, Juanqiong Gou, Wenxin Mu, Liyu Peng:
Modeling of Railway Risk Inter-Relation based on the study of Accident Context. ISCRAM 2017 - 2016
- [j1]Joshua Joy, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou, Mario Gerla:
DiscoverFriends: secure social network communication in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 16(11): 1401-1413 (2016) - [c3]Yuanjie Li, Chunyi Peng, Zengwen Yuan, Jiayao Li, Haotian Deng, Tao Wang:
Mobileinsight: extracting and analyzing cellular network information on smartphones. MobiCom 2016: 202-215 - [c2]Yuanjie Li, Haotian Deng, Chunyi Peng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu:
iCellular: Device-Customized Cellular Network Access on Commodity Smartphones. NSDI 2016: 643-656 - [c1]Yuanjie Li, Haotian Deng, Jiayao Li, Chunyi Peng, Songwu Lu:
Instability in Distributed Mobility Management: Revisiting Configuration Management in 3G/4G Mobile Networks. SIGMETRICS 2016: 261-272 - 2015
- [i1]Yuanjie Li, Haotian Deng, Chunyi Peng, Guan-Hua Tu, Jiayao Li, Zengwen Yuan, Songwu Lu:
iCellular: Define Your Own Cellular Network Access on Commodity Smartphones. CoRR abs/1510.08027 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint