default search action
Jiye Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Jiye Wang, Xuezhi Xiang, Shuai Ding, Abdulmotaleb El-Saddik:
3D hand pose estimation and reconstruction based on multi-feature fusion. J. Vis. Commun. Image Represent. 101: 104160 (2024) - 2022
- [j17]Jiye Wang, Chaofeng Lou, Guixia Liu, Weihua Li, Zengrui Wu, Yun Tang:
Profiling prediction of nuclear receptor modulators with multi-task deep learning methods: toward the virtual screening. Briefings Bioinform. 23(5) (2022) - [j16]Chaofeng Lou, Hongbin Yang, Jiye Wang, Mengting Huang, Weihua Li, Guixia Liu, Philip W. Lee, Yun Tang:
IDL-PPBopt: A Strategy for Prediction and Optimization of Human Plasma Protein Binding of Compounds via an Interpretable Deep Learning Method. J. Chem. Inf. Model. 62(11): 2788-2799 (2022) - 2021
- [j15]Geng Zhang, Jiawen Shi, Shiyan Huang, Jiye Wang, Hao Jiang:
A Cascading Failure Model Considering Operation Characteristics of the Communication Layer. IEEE Access 9: 9493-9504 (2021) - [j14]Yayuan Peng, Manjiong Wang, Yixiang Xu, Zengrui Wu, Jiye Wang, Chao Zhang, Guixia Liu, Weihua Li, Jian Li, Yun Tang:
Drug repositioning by prediction of drug's anatomical therapeutic chemical code via network-based inference approaches. Briefings Bioinform. 22(2): 2058-2072 (2021) - [j13]Zhi Li, Jiye Wang, Yang Wang, Sachula Meng, Sai Wu, Huixia Ding, Zhihui Wang:
Trade-off analysis between delay and throughput of RAN slicing for smart grid. Comput. Commun. 180: 21-30 (2021) - [j12]Jiye Wang, Zengrui Wu, Yayuan Peng, Weihua Li, Guixia Liu, Yun Tang:
Pathway-Based Drug Repurposing with DPNetinfer: A Method to Predict Drug-Pathway Associations via Network-Based Approaches. J. Chem. Inf. Model. 61(5): 2475-2485 (2021) - [j11]Zengrui Wu, Qiaohui Wang, Hongbin Yang, Jiye Wang, Weihua Li, Guixia Liu, Yi Yang, Yuzheng Zhao, Yun Tang:
Discovery of Natural Products Targeting NQO1 via an Approach Combining Network-Based Inference and Identification of Privileged Substructures. J. Chem. Inf. Model. 61(5): 2486-2498 (2021) - [c10]Geng Zhang, Yanan Wang, Guojing Liu, Xueqing Wang, Kaiqiang Gao, Jiye Wang:
A Trusted Data Storage and Access Control Scheme for Power CPS Combining Blockchain and Attribute-Based Encryption. ICCT 2021: 355-359 - 2020
- [j10]Shuhua Zhang, Jiye Wang, Jie Tong, Jun Zhang, Minghao Zhang:
Cloud-Edge Fusion Based Abnormal Object Detection of Power Transmission Lines Using Incremental Learning. IEEE Access 8: 218694-218701 (2020) - [j9]Fagen Li, Jiye Wang, Yuyang Zhou, Chunhua Jin, SK Hafizul Islam:
A heterogeneous user authentication and key establishment for mobile client-server environment. Wirel. Networks 26(2): 913-924 (2020) - [c9]Jiye Wang, Chenyu Zhang, Yang Li, Baozhong Hao, Zhaoming Lu:
Research on Time-Sensitive BBU Shaper for Supporting the Transmission of Smart Grid. 6GN 2020: 477-485
2010 – 2019
- 2019
- [j8]Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li:
Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann. des Télécommunications 74(7-8): 435-449 (2019) - [j7]Kai Hu, Zhangbo Duan, Jiye Wang, Lingchao Gao, Lihong Shang:
Template-based AADL automatic code generation. Frontiers Comput. Sci. 13(4): 698-714 (2019) - 2018
- [j6]Chen Lv, Wei Jiang, Songlin Hu, Jiye Wang, Guoliang Lu, Zhiyong Liu:
Efficient Dynamic Evolution of Service Composition. IEEE Trans. Serv. Comput. 11(4): 630-643 (2018) - [j5]Yue Liu, Shuai Guo, Songlin Hu, Tilmann Rabl, Hans-Arno Jacobsen, Jintao Li, Jiye Wang:
Performance Evaluation and Optimization of Multi-Dimensional Indexes in Hive. IEEE Trans. Serv. Comput. 11(5): 835-849 (2018) - [c8]Jiye Wang, Zhihua Cheng:
FP-Growth based Regular Behaviors Auditing in Electric Management Information System. ITQM 2018: 275-279 - 2017
- [j4]Zhenghua Hu, Tao Jia, Guofeng Wang, Jiye Wang, Lingkui Meng:
Computing a hierarchy favored optimal route in a Voronoi-based road network with multiple levels of detail. Int. J. Geogr. Inf. Sci. 31(11): 2216-2233 (2017) - [j3]Shunzhi Zhu, Yan Wang, Shuo Shang, Guang Zhao, Jiye Wang:
Probabilistic routing using multimodal data. Neurocomputing 253: 49-55 (2017) - [j2]Tao Jia, Kai Chen, Jiye Wang:
Characterizing the Growth Patterns of 45 Major Metropolitans in Mainland China Using DMSP/OLS Data. Remote. Sens. 9(6): 571 (2017) - [c7]Jiye Wang, Liang Zhou, Xindai Lu, Huan Ying, Haixiang Wang:
Towards a Novel Protocol Analysis Framework for Industrial Control Systems. SmartCom 2017: 449-456 - 2016
- [c6]Jun He, Yue Zhang, Jiye Wang, Nan Zeng, Hanyong Hao:
Robust K-subspaces recovery with combinatorial initialization. IEEE BigData 2016: 3573-3582 - 2015
- [j1]Xueyang Fu, Jiye Wang, Delu Zeng, Yue Huang, Xinghao Ding:
Remote Sensing Image Enhancement Using Regularized-Histogram Equalization and DCT. IEEE Geosci. Remote. Sens. Lett. 12(11): 2301-2305 (2015) - [c5]Songlin Hu, Wantao Liu, Tilmann Rabl, Shuo Huang, Ying Liang, Zheng Xiao, Hans-Arno Jacobsen, Xubin Pei, Jiye Wang:
DualTable: A hybrid storage model for update optimization in Hive. ICDE 2015: 1340-1351 - 2013
- [c4]Jiye Wang, Zhihua Cheng, Jinghong Guo:
Distributed IPv6 Sensor Network Networking Method Based on Dynamic Regional Agents. CloudComp 2013: 287-296 - [c3]Zhaoqian Wang, Wanshan Wang, Jiye Wang, Chunguang Liu:
Cutting simulation and test based on different rock parameters. ICIA 2013: 735-740 - 2011
- [c2]Jianming Liu, Jiye Wang, Ning Li, Zhenmin Chen:
Research and Validation of the Smart Power Two-Way Interactive System Based on Unified Communication Technology. ICSI (2) 2011: 434-440
2000 – 2009
- 2002
- [c1]Yang Qu II, Chuang Lin, Jiye Wang:
Linear Temporal Inference of Workflow Management Systems Based on Timed Petri Nets Models. EDCIS 2002: 30-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint