​
Login / Signup
Jing Hu
ORCID
Publication Activity (10 Years)
Years Active: 2013-2023
Publications (10 Years): 13
Top Topics
Wireless Sensor Networks
Formal Analysis
Hand Gesture Recognition
Security Protocols
Top Venues
Multim. Tools Appl.
J. Appl. Math.
ICECCS
CoRR
</>
Publications
</>
Xueqi Gao
,
Chao Xu
,
Yihang Song
,
Jing Hu
,
Jian Xiao
,
Zhaopeng Meng
Node-Wise Domain Adaptation Based on Transferable Attention for Recognizing Road Rage via EEG.
ICASSP
(2023)
Zihang Wan
,
Chao Xu
,
Jing Hu
,
Jian Xiao
,
Zhaopeng Meng
,
Jitai Chen
Multi-view Stereo Network with Attention Thin Volume.
PRICAI (3)
(2022)
Xueqi Gao
,
Chao Xu
,
Yihang Song
,
Jing Hu
,
Jian Xiao
,
Zhaopeng Meng
Node-wise Domain Adaptation Based on Transferable Attention for Recognizing Road Rage via EEG.
CoRR
(2022)
Ziqi Xu
,
Chao Xu
,
Jing Hu
,
Zhaopeng Meng
Robust resistance to noise and outliers: Screened Poisson Surface Reconstruction using adaptive kernel density estimation.
Comput. Graph.
97 (2021)
Kanghui Zeng
,
Chao Xu
,
Jing Hu
,
Yushi Li
,
Zhaopeng Meng
L-DPSNet: Deep Photometric Stereo Network via Local Diffuse Reflectance Maxima.
ICONIP (5)
(2021)
Longpeng Li
,
Guangquan Xu
,
Litao Jiao
,
Xiaotong Li
,
Hao Wang
,
Jing Hu
,
Hequn Xian
,
Wenjuan Lian
,
Honghao Gao
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.
IEEE Trans. Ind. Informatics
16 (3) (2020)
Lili Quan
,
Qianyu Guo
,
Hongxu Chen
,
Xiaofei Xie
,
Xiaohong Li
,
Yang Liu
,
Jing Hu
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
ASE
(2020)
Zhe Liang
,
Chao Xu
,
Jing Hu
,
Yushi Li
,
Zhaopeng Meng
Better Together: Shading Cues and Multi-View Stereo for Reconstruction Depth Optimization.
IEEE Access
8 (2020)
Ying Wang
,
Jing Hu
,
Xiaohong Li
,
Zhiyong Feng
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET.
CollaborateCom
(2019)
Meng Xing
,
Jing Hu
,
Zhiyong Feng
,
Yong Su
,
Weilong Peng
,
Jinqing Zheng
Dynamic hand gesture recognition using motion pattern and shape descriptors.
Multim. Tools Appl.
78 (8) (2019)
Xingxing Zhang
,
Chao Xu
,
Wanli Xue
,
Jing Hu
,
Yongchuan He
,
Mengxin Gao
Emotion Recognition Based on Multichannel Physiological Signals with Comprehensive Nonlinear Processing.
Sensors
18 (11) (2018)
Jinqing Zheng
,
Zhiyong Feng
,
Chao Xu
,
Jing Hu
,
Weimin Ge
Fusing shape and spatio-temporal features for depth-based dynamic hand gesture recognition.
Multim. Tools Appl.
76 (20) (2017)
Jing Hu
,
Liang Li
,
Xiaotong Li
,
Chi Zhang
,
Weichao Liu
,
Zhiyong Fu
BabyTalk: Interactive Design of Intelligent Toys for Pre-school Children in China.
CCHI
(2016)
Dongdong Tian
,
Xiaohong Li
,
Jing Hu
,
Guangquan Xu
,
Zhiyong Feng
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
SecureComm
(2015)
Jiaojiao Song
,
Xiaohong Li
,
Jing Hu
,
Guangquan Xu
,
Zhiyong Feng
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
TrustCom/BigDataSE/ISPA (1)
(2015)
Gang Shen
,
Xiaohong Li
,
Ruitao Feng
,
Guangquan Xu
,
Jing Hu
,
Zhiyong Feng
An Extended UML Method for the Verification of Security Protocols.
ICECCS
(2014)
Xiaoru Li
,
Xiaohong Li
,
Guangquan Xu
,
Jing Hu
,
Zhiyong Feng
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Appl. Math.
2014 (2014)
Zhuobing Han
,
Xiaohong Li
,
Ruitao Feng
,
Jing Hu
,
Guangquan Xu
,
Zhiyong Feng
A Three-Dimensional Model for Software Security Evaluation.
TASE
(2014)
Xiaofei Wu
,
Xiaohong Li
,
Ruitao Feng
,
Guangquan Xu
,
Jing Hu
,
Zhiyong Feng
OOPN-SRAM: A Novel Method for Software Risk Assessment.
ICECCS
(2014)
Chengwei Zhang
,
Xiaohong Li
,
Jing Hu
,
Zhiyong Feng
,
Jiaojiao Song
Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols.
J. Appl. Math.
2014 (2014)
Changxiao Du
,
Xiaohong Li
,
Hong Shi
,
Jing Hu
,
Ruitao Feng
,
Zhiyong Feng
Architecture Security Evaluation Method Based on Security of the Components.
APSEC (1)
(2013)
Lu Yan
,
Xiaohong Li
,
Ruitao Feng
,
Zhiyong Feng
,
Jing Hu
Detection Method of the Second-Order SQL Injection in Web Applications.
SOFL+MSVL
(2013)