Остановите войну!
for scientists:
default search action
Xianjin Fang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Gaoming Yang, Shicheng Zhang, Xianjin Fang, Ji Zhang:
Pyramid style-attentional network for arbitrary style transfer. Multim. Tools Appl. 83(5): 13483-13502 (2024) - [j25]Chenxing Xia, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. J. Supercomput. 80(2): 2487-2513 (2024) - 2023
- [j24]Xingzhu Liang, Yu'e Lin, Shunxiang Zhang, Xianjin Fang:
Complete joint global and local collaborative marginal fisher analysis. Appl. Intell. 53(10): 12873-12887 (2023) - [j23]Chenxing Xia, Yanguang Sun, Xianjin Fang, Bin Ge, Xiuju Gao, Kuan-Ching Li:
IMSFNet: integrated multi-source feature network for salient object detection. Appl. Intell. 53(19): 22228-22248 (2023) - [j22]Kaiwen Hua, Xianjin Fang, Zhiri Tang, Ying Cheng, Zekuan Yu:
DCAM-NET:A novel domain generalization optic cup and optic disc segmentation pipeline with multi-region and multi-scale convolution attention mechanism. Comput. Biol. Medicine 163: 107076 (2023) - [j21]Hui Xu, Rui Zhu, Xia Sun, Xianjin Fang, Pan Qi, Huaguo Liang, Zhengfeng Huang:
Novel Critical Gate-Based Circuit Path-Level NBTI-Aware Aging Circuit Degradation Prediction. J. Circuits Syst. Comput. 32(10): 2350175:1-2350175:19 (2023) - [j20]Gaoming Yang, Anxing Wei, Xianjin Fang, Ji Zhang:
FDS_2D: rethinking magnitude-phase features for DeepFake detection. Multim. Syst. 29(4): 2399-2413 (2023) - [j19]Kun Xu, Gaoming Yang, Xianjin Fang, Ji Zhang:
Facial depth forgery detection based on image gradient. Multim. Tools Appl. 82(19): 29501-29525 (2023) - [j18]Gaoming Yang, Tao Wang, Xianjin Fang, Ji Zhang:
RSFace: subject agnostic face swapping with expression high fidelity. Vis. Comput. 39(11): 5497-5511 (2023) - [j17]Gaoming Yang, Kun Xu, Xianjin Fang, Ji Zhang:
Video face forgery detection via facial motion-assisted capturing dense optical flow truncation. Vis. Comput. 39(11): 5589-5608 (2023) - [c7]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
Automated Inference on Financial Security of Ethereum Smart Contracts. USENIX Security Symposium 2023: 3367-3383 - 2022
- [j16]Wenbing Shi, Xianjin Fang, Gaoming Yang, Ji Huang:
Human Activity Recognition Based on Multichannel Convolutional Neural Network With Data Augmentation. IEEE Access 10: 76596-76606 (2022) - [j15]Xianjin Fang, Zhiwei Li, Gaoming Yang:
A novel approach to generating high-resolution adversarial examples. Appl. Intell. 52(2): 1289-1305 (2022) - [j14]Zhiwei Li, Xianjin Fang, Gaoming Yang:
Remove adversarial perturbations with linear and nonlinear image filters. Displays 73: 102143 (2022) - [j13]Chenxing Xia, Songsong Duan, Xianjin Fang, Xiuju Gao, Yanguang Sun, Bin Ge, Hanling Zhang, Kuan-Ching Li:
EFGNet: Encoder steered multi-modality feature guidance network for RGB-D salient object detection. Digit. Signal Process. 131: 103775 (2022) - [j12]Yu'e Lin, Xingzhu Liang, Gan Hu, Xianjin Fang:
Smarter peer learning for online knowledge distillation. Multim. Syst. 28(3): 1059-1067 (2022) - [j11]Huaqing Tu, Gongming Zhao, Hongli Xu, Xianjin Fang:
Tenant-Grained Request Scheduling in Software-Defined Cloud Computing. IEEE Trans. Parallel Distributed Syst. 33(12): 4654-4671 (2022) - [c6]Songsong Duan, Chenxing Xia, Xianjin Fang, Bin Ge, Xiuju Gao, Kuan-Ching Li:
PSINet: Progressive Saliency Iteration Network for RGB-D Salient Object Detection. HCMA@MM 2022: 61-70 - [c5]Chenxing Xia, Songsong Duan, Xianjin Fang, Bin Ge, Xiuju Gao, Jianhua Cui:
DAST: Depth-Aware Assessment and Synthesis Transformer for RGB-D Salient Object Detection. PRICAI (2) 2022: 473-487 - [c4]Chenxing Xia, Yanguang Sun, Xianjin Fang, Bin Ge, Xiuju Gao, Jianhua Cui:
CMNet: Cross-Aggregation Multi-branch Network for Salient Object Detection. PRICAI (3) 2022: 567-578 - [i1]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
An Automated Analyzer for Financial Security of Ethereum Smart Contracts. CoRR abs/2208.12960 (2022) - 2021
- [j10]Zhifeng Xu, Xianjin Fang, Gaoming Yang:
Malbert: A novel pre-training method for malware detection. Comput. Secur. 111: 102458 (2021) - [j9]Chenxing Xia, Xiuju Gao, Xianjin Fang, Kuan-Ching Li, Shuzhi Su, Haitao Zhang:
RLP-AGMC: Robust label propagation for saliency detection based on an adaptive graph with multiview connections. Signal Process. Image Commun. 98: 116372 (2021) - 2020
- [j8]Gaoming Yang, Xinxin Ye, Xianjin Fang, Rongshi Wu, Li Wang:
Associated Attribute-Aware Differentially Private Data Publishing via Microaggregation. IEEE Access 8: 79158-79168 (2020) - [j7]Xianjin Fang, Qingkui Zeng, Gaoming Yang:
Local differential privacy for human-centered computing. EURASIP J. Wirel. Commun. Netw. 2020(1): 65 (2020) - [j6]Shuzhi Su, Xianjin Fang, Gaoming Yang, Bin Ge, Ping Zheng:
Clustering adaptive canonical correlations for high-dimensional multi-modal data. J. Vis. Commun. Image Represent. 71: 102815 (2020) - [j5]Fangchao Yu, Li Wang, Xianjin Fang, Youwen Zhang:
The Defense of Adversarial Example with Conditional Generative Adversarial Networks. Secur. Commun. Networks 2020: 3932584:1-3932584:12 (2020) - [j4]Hou Deng, Liusheng Huang, Hongli Xu, Xiangyan Liu, Pengzhan Wang, Xianjin Fang:
Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers. IEEE Trans. Cloud Comput. 8(3): 899-913 (2020) - [c3]Kymbat Taalaibekova, Xianjin Fang, Zhifeng Xu:
A Novel Method to Improve Security and Imperceptibility of Image Steganography. FCS 2020: 611-627 - [c2]Xianjin Fang, Qingkui Zeng, Gaoming Yang:
Local Differential Privacy for Data Streams. SPDE 2020: 143-160
2010 – 2019
- 2019
- [j3]Xianjin Fang, Fangchao Yu, Gaoming Yang, Youyang Qu:
Regression Analysis With Differential Privacy Preserving. IEEE Access 7: 129353-129361 (2019) - [j2]Gaoming Yang, Tao Dong, Xianjin Fang, Shuzhi Su:
Association data release with the randomised response based on Bayesian networks. Int. J. Comput. Sci. Eng. 20(1): 120-129 (2019) - 2015
- [j1]Xianjin Fang, Li Wang, Jia Kang, Jia Liu:
树突细胞算法及其理论研究 (On Dendritic Cell Algorithm and its Theoretical Investigation). 计算机科学 42(2): 131-133 (2015)
2000 – 2009
- 2008
- [c1]Xianjin Fang, Longshu Li:
An Artificial Immune Model with Vaccine Operator for Network Intrusion Detection. PACIIA (1) 2008: 488-491
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-02 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint