default search action
Jiayang Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Jiayang Liu, Fuqi Xie, Qiang Zhang, Qiucheng Lyu, Xiaosun Wang, Shijing Wu:
A multisensory time-frequency features fusion method for rotating machinery fault diagnosis under nonstationary case. J. Intell. Manuf. 35(7): 3197-3217 (2024) - [j17]Jiayang Liu, Lina Wang, Amol Yerudkar, Yang Liu:
Set stabilization of logical control networks: A minimum node control approach. Neural Networks 174: 106266 (2024) - [c25]Jiayang Liu, Yiming Bu, Daniel Tso, Qinru Qiu:
Improved Efficiency Based on Learned Saccade and Continuous Scene Reconstruction From Foveated Visual Sampling. ICLR 2024 - [c24]Jiayang Liu, Kai Wang, Zheng Wang, Xing Xu:
SADA: Self-Adaptive Domain Adaptation From Black-Box Predictors. ICME 2024: 1-6 - [c23]Kai Wang, Jiayang Liu, Xing Xu, Jingkuan Song, Xin Liu, Heng Tao Shen:
Unsupervised Cross-Domain Image Retrieval with Semantic-Attended Mixture-of-Experts. SIGIR 2024: 197-207 - [i10]Yiming Bu, Jiayang Liu, Qinru Qiu:
Predictive Temporal Attention on Event-based Video Stream for Energy-efficient Situation Awareness. CoRR abs/2402.08936 (2024) - [i9]Lingdong Kong, Shaoyuan Xie, Hanjiang Hu, Yaru Niu, Wei Tsang Ooi, Benoit R. Cottereau, Lai Xing Ng, Yuexin Ma, Wenwei Zhang, Liang Pan, Kai Chen, Ziwei Liu, Weichao Qiu, Wei Zhang, Xu Cao, Hao Lu, Ying-Cong Chen, Caixin Kang, Xinning Zhou, Chengyang Ying, Wentao Shang, Xingwei Wang, Yinpeng Dong, Bo Yang, Shengyin Jiang, Zeliang Ma, Dengyi Ji, Haiwen Li, Xingliang Huang, Yu Tian, Genghua Kou, Fan Jia, Yingfei Liu, Tiancai Wang, Ying Li, Xiaoshuai Hao, Yifan Yang, Hui Zhang, Mengchuan Wei, Yi Zhou, Haimei Zhao, Jing Zhang, Jinke Li, Xiao He, Xiaoqiang Cheng, Bingyang Zhang, Lirong Zhao, Dianlei Ding, Fangsheng Liu, Yixiang Yan, Hongming Wang, Nanfei Ye, Lun Luo, Yubo Tian, Yiwei Zuo, Zhe Cao, Yi Ren, Yunfan Li, Wenjie Liu, Xun Wu, Yifan Mao, Ming Li, Jian Liu, Jiayang Liu, Zihan Qin, Cunxi Chu, Jialei Xu, Wenbo Zhao, Junjun Jiang, Xianming Liu, Ziyan Wang, Chiwei Li, Shilong Li, Chendong Yuan, Songyue Yang, Wentao Liu, Peng Chen, Bin Zhou, Yubo Wang, Chi Zhang, Jianhang Sun, Hai Chen, Xiao Yang, Lizhong Wang, Dongyi Fu, Yongchun Lin, Huitong Yang, Haoang Li, Yadan Luo, Xianjing Cheng, Yong Xu:
The RoboDrive Challenge: Drive Anytime Anywhere in Any Condition. CoRR abs/2405.08816 (2024) - [i8]Yifan Mao, Ming Li, Jian Liu, Jiayang Liu, Zihan Qin, Chunxi Chu, Jialei Xu, Wenbo Zhao, Junjun Jiang, Xianming Liu:
DINO-SD: Champion Solution for ICRA 2024 RoboDepth Challenge. CoRR abs/2405.17102 (2024) - 2023
- [j16]Jiayang Liu, Xiaosun Wang, Fuqi Xie, Shijing Wu, Deng Li:
Condition monitoring of wind turbines with the implementation of spatio-temporal graph neural network. Eng. Appl. Artif. Intell. 121: 106000 (2023) - [j15]Jiayang Liu, Xiaosun Wang, Shijing Wu, Liang Wan, Fuqi Xie:
Wind turbine fault detection based on deep residual networks. Expert Syst. Appl. 213(Part): 119102 (2023) - [j14]Jiayang Liu, Qiang Zhang, Fuqi Xie, Xiaosun Wang, Shijing Wu:
Incipient fault detection of planetary gearbox under steady and varying condition. Expert Syst. Appl. 233: 121003 (2023) - [j13]Jiayang Liu, Weiming Zhang, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma:
Unauthorized AI cannot recognize me: Reversible adversarial example. Pattern Recognit. 134: 109048 (2023) - [j12]Qiucheng Lyu, Jiayang Liu, Yuwei He, Xiaosun Wang, Shijing Wu:
Condition Monitoring of Wind Turbines With Implementation of Interactive Spatio-Temporal Deep Learning Networks. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - [j11]Lina Wang, Jiayang Liu, Yang Liu, Weihua Gui:
Pinning Stabilizer Design for Probabilistic Boolean Control Networks via Condensation Digraph. IEEE Trans. Neural Networks Learn. Syst. 34(12): 10130-10140 (2023) - [c22]Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. ICCV 2023: 4312-4321 - [c21]Yiming Bu, Jiayang Liu, Qinru Qiu:
Predictive Temporal Attention on Event-based Video Stream for Energy-efficient Situation Awareness. IGSC 2023: 22-28 - [c20]Jiayang Liu, Xieyuanli Chen, Junhao Xiao, Sichao Lin, Zhiqiang Zheng, Huimin Lu:
Hybrid Map-Based Path Planning for Robot Navigation in Unstructured Environments. IROS 2023: 2216-2223 - [c19]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [i7]Jiayang Liu, Xieyuanli Chen, Junhao Xiao, Sichao Lin, Zhiqiang Zheng, Huimin Lu:
Hybrid Map-Based Path Planning for Robot Navigation in Unstructured Environments. CoRR abs/2303.05304 (2023) - [i6]Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang:
Improving Adversarial Transferability by Stable Diffusion. CoRR abs/2311.11017 (2023) - 2022
- [j10]Chuan Qin, Wei Ming Zhang, Hang Zhou, Jiayang Liu, Yuan He, Nenghai Yu:
Robustness enhancement against adversarial steganography via steganalyzer outputs. J. Inf. Secur. Appl. 68: 103252 (2022) - [j9]Zhenyu Du, Xingxing Wei, Weiming Zhang, Fangzheng Liu, Huanyu Bian, Jiayang Liu:
A motional but temporally consistent physical video examples. J. Inf. Secur. Appl. 69: 103278 (2022) - [c18]Rui Yao, Duo Tan, Ye Yang, Yongmei Li, Jiayang Liu, Jiajing Wu, Shanxiong Chen, Jingjie Wang:
MBH-Net: Multi-branch Hybrid Network with Auxiliary Attention Guidance for Large Vessel Occlusion Detection. BIBM 2022: 872-876 - [c17]Duo Tan, Jingjie Wang, Rui Yao, Jiayang Liu, Jiajing Wu, Shiyu Zhu, Ye Yang, Shanxiong Chen, Yongmei Li:
CCA4CTA: A Hybrid Attention Mechanism based Convolutional Network for Analysing Collateral Circulation via Multi-phase Cranial CTA. BIBM 2022: 1201-1206 - [c16]Ruihan Zeng, Wei Dai, Huimin Lu, Jiayang Liu, Hui Zhang:
A Local Planner Based on Environmental Geometric Features for Rescue Robots. ICNSC 2022: 1-7 - 2021
- [j8]Liang Guo, Jinwei Zhu, Jiayang Liu, Kun Cheng:
Full Encryption: An end to end encryption mechanism in GaussDB. Proc. VLDB Endow. 14(12): 2811-2814 (2021) - 2020
- [j7]Jiayang Liu, Jingguo Bi, Mu Li:
Secure outsourcing of large matrix determinant computation. Frontiers Comput. Sci. 14(1) (2020) - [j6]Dongyao Jia, Zhonglin Wang, Jiayang Liu:
Research on flame location based on adaptive window and weight stereo matching algorithm. Multim. Tools Appl. 79(11-12): 7875-7887 (2020) - [j5]Jiayang Liu, Gongping Wu, Fei Fan, Yuxin Li:
A Robot Hybrid Hierarchical Network for Sensing Environmental Variables of a Smart Grid. Sensors 20(19): 5521 (2020) - [j4]Jiayang Liu, Yang Liu, Yuqian Guo, Weihua Gui:
Sampled-Data State-Feedback Stabilization of Probabilistic Boolean Control Networks: A Control Lyapunov Function Approach. IEEE Trans. Cybern. 50(9): 3928-3937 (2020) - [c15]Xiaoyi Dong, Jiangfan Han, Dongdong Chen, Jiayang Liu, Huanyu Bian, Zehua Ma, Hongsheng Li, Xiaogang Wang, Weiming Zhang, Nenghai Yu:
Robust Superpixel-Guided Attentional Adversarial Attack. CVPR 2020: 12892-12901
2010 – 2019
- 2019
- [j3]Jiayang Liu, Jingguo Bi, Songyan Xu:
An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. IEEE Access 7: 59388-59393 (2019) - [c14]Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu:
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View. CVPR 2019: 4825-4834 - [c13]Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, Nenghai Yu:
Emerging applications of reversible data hiding. ICIGP 2019: 105-109 - [c12]Jiayang Liu, Jingguo Bi:
Secure Outsourcing of Lattice Basis Reduction. ICONIP (2) 2019: 603-615 - [c11]Jiayang Liu, Jingguo Bi:
Practical Scheme for Secure Outsourcing of Coppersmith's Algorithm. KSEM (2) 2019: 229-240 - [c10]Zhenshan Bao, Jiayang Liu, Wenbo Zhang:
Using Distillation to Improve Network Performance after Pruning and Quantization. MLMI 2019: 3-6 - [c9]Haoda Li, Guoliang Li, Jiayang Liu, Haitao Yuan, Haiquan Wang:
Ratel: Interactive Analytics for Large Scale Trajectories. SIGMOD Conference 2019: 1949-1952 - 2018
- [j2]Jiayang Liu, Jingguo Bi:
Equivalent key attack against a public-key cryptosystem based on subset sum problem. IET Inf. Secur. 12(6): 498-501 (2018) - [c8]Aren Jansen, Manoj Plakal, Ratheet Pandya, Daniel P. W. Ellis, Shawn Hershey, Jiayang Liu, R. Channing Moore, Rif A. Saurous:
Unsupervised Learning of Semantic Audio Representations. ICASSP 2018: 126-130 - [c7]Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu:
Adversarial Examples Against Deep Neural Network based Steganalysis. IH&MMSec 2018: 67-72 - [i5]Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Nenghai Yu:
Detecting Adversarial Examples Based on Steganalysis. CoRR abs/1806.09186 (2018) - [i4]Jiayang Liu, Dongdong Hou, Weiming Zhang, Nenghai Yu:
Reversible Adversarial Examples. CoRR abs/1811.00189 (2018) - [i3]Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, Nenghai Yu:
Emerging Applications of Reversible Data Hiding. CoRR abs/1811.02928 (2018) - [i2]Jiayang Liu, Weiming Zhang, Nenghai Yu:
CAAD 2018: Iterative Ensemble Adversarial Attack. CoRR abs/1811.03456 (2018) - 2017
- [i1]Aren Jansen, Manoj Plakal, Ratheet Pandya, Daniel P. W. Ellis, Shawn Hershey, Jiayang Liu, R. Channing Moore, Rif A. Saurous:
Unsupervised Learning of Semantic Audio Representations. CoRR abs/1711.02209 (2017) - 2016
- [c6]Jiayang Liu, Jingguo Bi:
Cryptanalysis of a Fast Private Information Retrieval Protocol. AsiaPKC@AsiaCCS 2016: 56-60 - [c5]Jingguo Bi, Jiayang Liu, Xiaoyun Wang:
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. Inscrypt 2016: 243-252 - [c4]Jingguo Bi, Jiayang Liu:
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013. ISPEC 2016: 37-47
2000 – 2009
- 2009
- [j1]Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan:
uWave: Accelerometer-based personalized gesture recognition and its applications. Pervasive Mob. Comput. 5(6): 657-675 (2009) - [c3]Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan:
User evaluation of lightweight user authentication with a single tri-axis accelerometer. Mobile HCI 2009 - [c2]Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan:
uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications. PerCom 2009: 1-9 - 2008
- [c1]Jiayang Liu, Lin Zhong:
Micro power management of active 802.11 interfaces. MobiSys 2008: 146-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint