关注
Jin He
Jin He
Chengdu University of Information Technology
在 cuit.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
J He, M Dong, K Ota, M Fan, G Wang
Peer-to-Peer Networking and Applications 9, 67-81, 2016
422016
Customized network security for cloud service
J He, K Ota, M Dong, LT Yang, M Fan, G Wang, SS Yau
IEEE Transactions on Services Computing 13 (5), 801-814, 2017
162017
NSCC: Self-service network security architecture for cloud computing
J He, M Dong, K Ota, M Fan, G Wang
2014 IEEE 17th International Conference on Computational Science and …, 2014
62014
Event-Triggered bundled target traversing path planning using a dynamic elliptical guidance region for unmanned surface vehicles
X Jin, G Zhang, J He, W Yu, S Jiang, W Wang, D Guo, F Zheng, Y Deng, ...
Applied Ocean Research 141, 103793, 2023
32023
NetSecCC: a scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw Appl 9 (1): 67–81
J He, D Mianxiong, K Ota, M Fan, G Wang
32016
CNN-Transformer Bridge Mode for Detecting Arcing Horn Defects in Railway Sectional Insulator
J He, R Duan, M Dong, Y Kao, G Guo, J Liu
IEEE Transactions on Instrumentation and Measurement, 2024
12024
Computer-aided decision-making system for endometrial atypical hyperplasia based on multi-modal and multi-instance deep convolution neural networks
X Liao, X Zheng, J He, Q Li
Soft Computing, 1-16, 2021
12021
High-Performance FOG IMU and Algorithm for Railway Dynamic Inspection
Y Guan, J He, X Fu, D Wang
2021 IEEE 11th Annual International Conference on CYBER Technology in …, 2021
12021
A canonical form-based approach to affine registration of DTI
W Liu, LT Chen, HB Cai, QH Liu, J He, N Fei
Multimedia Tools and Applications 77, 19697-19718, 2018
12018
PNSICC: A novel parallel network security inspection mechanism based on cloud computing
J He, M Dong, K Ota, M Fan, G Wang
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
12015
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security
J He, M Dong, K Ota, M Fan, G Wang
arXiv preprint arXiv:1405.0660, 2014
12014
Multiple targets traversing for unmanned surface vehicles by bundled genetic optimization and fast-marching Q-Learning
Z Gou, X Jin, J He, Y Chen
Ocean Engineering 302, 117632, 2024
2024
Posture Tracking Algorithm based on MEMS AHRS Module for High-Speed Train Surveillance
H Li, J He, X Li, J Liu
2021 IEEE 11th Annual International Conference on CYBER Technology in …, 2021
2021
A canonical form-based approach to affine registration of DTI.
HB Cai, QH Liu, J He, W Liu, LT Chen, N Fei
Multimedia Tools & Applications 77 (15), 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–14