


default search action
Rong Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Rong Jiang 0001
— National University of Defense Technology, College of Computer Science and Technology, China (and 1 more)
- Rong Jiang 0002 — University of Wisconsin, Electrical and Computer Engineering Department, College of Engineering, Madison, WI, USA (and 1 more)
- Rong Jiang 0003
— Tongji University, Department of Control Science and Engineering, Shanghai, China (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j63]Jinsong Deng, Shaotang Cai, Weinong Wu, Rong Jiang, Hongyu Deng, Jinhua Ma, Yonghang Luo
:
A Cross-Regional Load Forecasting Method Based on a Pseudo-Distributed Federated Learning Strategy. IEEE Access 13: 22446-22458 (2025) - [j62]Hang Zhao, Rong Jiang, Wangtu Xu:
Determining capacity flexibility of the urban transit network under different transit operation conditions. Int. J. Gen. Syst. 54(1): 95-122 (2025) - [j61]Weiyi Zhong
, Wei Fang, Yifan Zhao
, Sifeng Wang, Chao Yan, Rong Jiang, Maqbool Khan
, Xuan Yang
, Wajid Rafique:
Ensuring privacy and correlation awareness in multi-dimensional service quality prediction and recommendation for IoT. Inf. Sci. 706: 122017 (2025) - [j60]Jianhang Dong, Rong Jiang, Yi Zhang, Shenghu Tian, Bin Wu:
A hierarchical access control and sharing model for healthcare data with on-chain-off-chain collaboration. J. Intell. Fuzzy Syst. 48(3): 215-231 (2025) - [j59]Rong Jiang, Yulin Li
, Xuetao Pu, Xueke Wang, Wenyu Niu, Zhiming Song:
A fair multi-party contract signing scheme based on off-chain protocols and on-chain smart contracts. J. Supercomput. 81(2): 372 (2025) - [j58]Rong Jiang, Hejiao Zhang, Zhiming Song, Sheng-Hu Tian, Wenlu Lou:
T-BFL model based on two-dimensional trust and blockchain-federated learning for medical data sharing. J. Supercomput. 81(2): 378 (2025) - [j57]Bo Wang, Rong Jiang, Xuetao Pu, Hejiao Zhang:
An on-chain and off-chain collaborative data sharing and access control model for electronic medical records. J. Supercomput. 81(2): 396 (2025) - 2024
- [j56]Rong Jiang, Xiaofei Mou
:
The Analysis of Multi-Track Music Generation With Deep Learning Models in Music Production Process. IEEE Access 12: 110322-110330 (2024) - [j55]Liang Yang, Rong Jiang
, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian:
An access control model based on blockchain master-sidechain collaboration. Clust. Comput. 27(1): 477-497 (2024) - [j54]Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan:
Distributed medical data storage model based on blockchain technology. Clust. Comput. 27(4): 4757-4777 (2024) - [j53]Rong Jiang
, Shi Chen, Fu-Ya Wang:
Quantile regression for massive data set. Commun. Stat. Simul. Comput. 53(12): 5875-5883 (2024) - [j52]Rong Jiang, Rui Liu, Tao Zhang
, Weiping Ding
, Sheng-Hu Tian:
An electronic medical record access control model based on intuitionistic fuzzy trust. Inf. Sci. 658: 120054 (2024) - [j51]Ling Sun, Rong Jiang, Wenbing Wan:
Task allocation algorithm for distributed large data stream group computing in the era of digital intelligence. J. Intell. Fuzzy Syst. 46(4): 11055-11066 (2024) - [j50]Chuanjia Yao, Rong Jiang, Bin Wu, Pinghui Li, Chenguang Wang:
A cross domain access control model for medical consortium based on DBSCAN and penalty function. BMC Medical Informatics Decis. Mak. 24(1): 260 (2024) - [j49]Pengxin Chen
, Xiaoqi Jiang, Yingjun Zhang
, Jiahao Tan, Rong Jiang:
MapCVV: On-Cloud Map Construction Using Crowdsourcing Visual Vectorized Elements Towards Autonomous Driving. IEEE Robotics Autom. Lett. 9(6): 5735-5742 (2024) - [j48]Rugang Tang, Xiaodao Wei, Chao Chen
, Rong Jiang, Fang Shen
:
Remote Sensing Observations of a Coastal Water Environment Based on Neural Network and Spatiotemporal Fusion Technology: A Case Study of Hangzhou Bay. Remote. Sens. 16(5): 800 (2024) - [c27]Zhikang Feng
, Chao Yan
, Rong Jiang
, Xiaolong Xu
, Xuyun Zhang
, Xiaokang Zhou
, Wanchun Dou
, Lianyong Qi
:
CHDAER: Consistent Hashing-based Data Allocation for Efficient Recommendation in Edge Environment. CIKM 2024: 622-631 - [c26]Chuanjia Yao, Rong Jiang
, Leijin Long
, Jianhang Dong
, Chenguang Wang
:
Blockchain-based Secure Storage and Cross-domain Sharing Mechanism for Medical Image Data. ICCBDC 2024: 33-40 - [c25]Tilei Gao, Ming Yang, Rong Jiang, Tao Zhang, Leijin Long:
Risk Matrix and D-S Theory Based Trustworthiness Assessment Method for Cloud Services. ICWS 2024: 116-122 - [c24]Chuanjia Yao, Rong Jiang
, Haoyun Li
, Haiyang Wang
, Feifei Tian
:
A decentralized V2V driving safety mutual assistance mechanism based on Blockchain and Gossip communication protocol. IECC 2024: 56-65 - [i1]Rong Jiang, Cong Ma:
Batched Nonparametric Contextual Bandits. CoRR abs/2402.17732 (2024) - 2023
- [j47]Liangmin Guo
, Li Sun, Rong Jiang, Yonglong Luo, Xiaoyao Zheng:
Recommendation based on attributes and social relationships. Expert Syst. Appl. 234: 121027 (2023) - [j46]Rong Jiang, Shanshan Han, Yimin Yu, Weiping Ding:
An access control model for medical big data based on clustering and risk. Inf. Sci. 621: 691-707 (2023) - [j45]Rong Jiang, Xue Chen, Yimin Yu, Ying Zhang
, Weiping Ding:
Risk and UCON-based access control model for healthcare big data. J. Big Data 10(1): 104 (2023) - [j44]Ying Zhang, Shiyu Rong, Elizabeth Dunlop
, Rong Jiang, Zhenyong Zhang, Jun Qing Tang:
Modeling the influence of individual differences on knowledge hiding. J. Knowl. Manag. 27(6): 1637-1659 (2023) - 2022
- [j43]ZY Chen, Ruei-Yuan Wang, Rong Jiang, Timothy Chen:
Neural ordinary differential gray algorithm to forecasting nonlinear systems. Adv. Eng. Softw. 173: 103199 (2022) - [j42]Rong Jiang, Yang Xin
, Zhenxing Chen, Ying Zhang
:
A medical big data access control model based on fuzzy trust prediction and regression analysis. Appl. Soft Comput. 117: 108423 (2022) - [j41]Rong Jiang
, Meng-Fan Guo, Xin Liu:
Composite quasi-likelihood for single-index models with massive datasets. Commun. Stat. Simul. Comput. 51(9): 5024-5040 (2022) - [j40]Rong Jiang
, Keming Yu
:
Renewable quantile regression for streaming data sets. Neurocomputing 508: 208-224 (2022) - [j39]Honglie Wang
, Rong Jiang, Jian Xu, Shouqian Sun:
RESC: REfine the SCore with adaptive transformer head for end-to-end object detection. Neural Comput. Appl. 34(14): 12017-12028 (2022) - [j38]Shuiguang Deng
, Hailiang Zhao
, Zhengzhe Xiang
, Cheng Zhang, Rong Jiang
, Ying Li
, Jianwei Yin
, Schahram Dustdar
, Albert Y. Zomaya
:
Dependent Function Embedding for Distributed Serverless Edge Computing. IEEE Trans. Parallel Distributed Syst. 33(10): 2346-2357 (2022) - [j37]Haowei Chen
, Shuiguang Deng
, Hongze Zhu
, Hailiang Zhao
, Rong Jiang
, Schahram Dustdar
, Albert Y. Zomaya
:
Mobility-Aware Offloading and Resource Allocation for Distributed Services Collaboration. IEEE Trans. Parallel Distributed Syst. 33(10): 2428-2443 (2022) - [c23]Lin Zhang, Rong Jiang, Meng Wang, Yue Yang, Chenguang Wang:
A Drug Safety Traceability Model Based on Big Data. BDE 2022: 1-7 - [c22]Meng Wang, Rong Jiang, Yue Yang, Chenguang Wang, Lin Zhang, Liang Yang, Xuetao Pu:
Medical service oriented blockchain data credibility evaluation method. ICSS 2022: 277-282 - 2021
- [j36]Rong Jiang
, Zifei Ma
, Juan Yang:
An assessment model for cloud service security risk based on entropy and support vector machine. Concurr. Comput. Pract. Exp. 33(21) (2021) - [j35]Rong Jiang
, Keming Yu
:
Smoothing quantile regression for a distributed system. Neurocomputing 466: 311-326 (2021) - [j34]Rong Jiang, Yang Xin
, Huiping Cheng
, Wenxuan Wu:
T-RBAC Model Based on Two-Dimensional Dynamic Trust Evaluation under Medical Big Data. Wirel. Commun. Mob. Comput. 2021: 9957214:1-9957214:17 (2021) - [c21]Yimin Yu, Chuanjia Yao, Yi Zhang, Rong Jiang:
Second-Hand Car Trading Framework Based on Blockchain in Cloud Service Environment. ACCC 2021: 115-121 - [c20]Xiaoyan Huang, Luxiao Wang, Xiaoming Hu, Rong Jiang, Yanjun Zhang, Juanjuan Fu, Xiumei Zhang:
Construction and Innovative Application of Chongqing Ecological Environment Big Data Platform. EITCE 2021: 1666-1669 - [c19]Peng Xiao, Haris Hadziosmanovic, Michael Klessens, Rong Jiang, John Ortega, Daniel Schroeder, James Palmer, Ilan Tsameret:
Customized Parallel Reliability Testing Platform with Multifold Throughput Enhancement for Intel Stressing Tests. IRPS 2021: 1-6 - 2020
- [j33]Wei Zhou
, Qingjuan Chen
, Danxue Luo
, Rong Jiang
, Jin Chen
:
Global Energy Consumption Analysis Based on the Three-Dimensional Network Model. IEEE Access 8: 76313-76332 (2020) - [j32]Xiaohan Hu, Rong Jiang, Mingyue Shi, Jingwei Shang:
A privacy protection model for health care big data based on trust evaluation access control in cloud service environment. J. Intell. Fuzzy Syst. 38(3): 3167-3178 (2020) - [j31]Rong Jiang
, Keming Yu
:
Single-index composite quantile regression for massive data. J. Multivar. Anal. 180: 104669 (2020) - [j30]Mingyue Shi
, Rong Jiang, Wei Zhou, Sen Liu, Savio Sciancalepore:
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory. Secur. Commun. Networks 2020: 5610839:1-5610839:18 (2020) - [j29]Zifei Ma, Ruiyin Li
, Tong Li, Rui Zhu
, Rong Jiang, Juan Yang, Mingjing Tang, Ming Zheng:
A data-driven risk measurement model of software developer turnover. Soft Comput. 24(2): 825-842 (2020) - [j28]Xiaoming Dong, Meng Qian, Rong Jiang:
Packet classification based on the decision tree with information entropy. J. Supercomput. 76(6): 4117-4131 (2020) - [c18]Peng Xiao, Haris Hadziosmanovic, Rong Jiang, Misagh Rostami-asrabad, Stephen Ramey, Ilan Tsamaret:
Reliability Stressing Control Using Jacobian Feedback Kelvin Measurement on Intel Technologies. IRPS 2020: 1-4
2010 – 2019
- 2019
- [j27]Rong Jiang
, Mingyue Shi, Wei Zhou:
A Privacy Security Risk Analysis Method for Medical Big Data in Urban Computing. IEEE Access 7: 143841-143854 (2019) - [j26]Danni Chang, Zhenyu Gu, Fan Li
, Rong Jiang:
A user-centric smart product-service system development approach: A case study on medication management for the elderly. Adv. Eng. Informatics 42 (2019) - [j25]Rong Jiang, Wentian He
, Wei Zhou, Yunpeng Hou, J. Y. Yang, Ping He:
Exploring management strategies to improve maize yield and nitrogen use efficiency in northeast China using the DNDC and DSSAT models. Comput. Electron. Agric. 166 (2019) - [j24]Tilei Gao
, Tong Li, Ming Yang
, Rong Jiang:
Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy. Entropy 21(5): 462 (2019) - [j23]Tilei Gao, Tong Li, Rong Jiang, Ming Yang, Rui Zhu:
Research on Cloud Service Security Measurement Based on Information Entropy. Int. J. Netw. Secur. 21(6): 1003-1013 (2019) - [j22]Xiaoming Dong, Liefu Ai, Rong Jiang:
Motion estimation of indoor robot based on image sequences and improved particle filter. Multim. Tools Appl. 78(21): 29747-29763 (2019) - [c17]Jiashan Pan, Tao Xi, Rong Jiang:
Emotional Effects of Smart Aromatherapeutic Home Devices. AHFE (21) 2019: 498-503 - [c16]Rong Jiang, Zhenyu Gu:
Current Theoretical Developments and Applications of Fitts' Law: A Literature Review. AHFE (4) 2019: 753-760 - [c15]Rong Jiang, Zhinan Zhang, Xiaoxuan Xi:
A Study of the Needs and Attitudes of Elderly People and Their Caregivers with Regards to Assistive Technologies. HCI (27) 2019: 200-211 - [c14]Xiu Fan Yang, Zhen Yu Gu, Rong Jiang, Dong Wang, Cheng Hong Yang:
The Service Design of Medication Administration System Based on IoT. HCI (37) 2019: 271-279 - [c13]Shijin Li, Ting Shi, Fushou Tao, Rong Jiang:
Research on Fine-Grain Model Recognition Based on Branch Feedback Convolution Neural Network. ICCSE 2019: 47-51 - [c12]Xiaohan Hu, Rong Jiang, Zhenwei Qian, Mingyue Shi, Jingwei Shang:
Research on Medical Big Data Security Management. ICNC-FSKD 2019: 359-367 - 2018
- [j21]Xiaoming Dong, Benyue Su
, Rong Jiang:
Indoor robot localization combining feature clustering with wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2018: 175 (2018) - [j20]Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang:
Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain. Int. J. Netw. Secur. 20(4): 664-673 (2018) - [j19]Rong Jiang, Zhi-Xia Yang:
Multiple rank multi-linear twin support matrix classification machine. J. Intell. Fuzzy Syst. 35(5): 5741-5754 (2018) - [j18]Rong Jiang
, Hossein Noori
, Fa Foster Dai
:
A Multi-Phase Coupled Oscillator Using Inductive Resonant Coupling and Modified Dual-Tank Techniques. IEEE J. Solid State Circuits 53(9): 2454-2464 (2018) - [j17]Zifei Ma, Rong Jiang, Ming Yang
, Tong Li, Qiujin Zhang:
Research on the measurement and evaluation of trusted cloud service. Soft Comput. 22(4): 1247-1262 (2018) - [c11]Jia Yu, Rong Jiang, Yuan Feng, Meng Yuan, Yong Il Kang, Zhenyu Gu:
Mobile VR Game Design for Stroke Rehabilitation. HCI (12) 2018: 95-116 - [c10]Tilei Gao, Tong Li, Rong Jiang, Ren Duan, Rui Zhu, Ming Yang
:
A Research About Trustworthiness Metric Method of SaaS Services Based on AHP. ICCCS (1) 2018: 207-218 - [c9]Hossein Noori
, Rong Jiang
, Fa Foster Dai:
A 1.8 GHz-2.4 GHz SAW-Less Reconfigurable Receiver Frontend RFIC in 65nm CMOS RF SOI. ISCAS 2018: 1-4 - 2017
- [j16]Chenxi Wu, Tefang Chen, Rong Jiang, Liwei Ning, Zheng Jiang:
A novel approach to wavelet selection and tree kernel construction for diagnosis of rolling element bearing fault. J. Intell. Manuf. 28(8): 1847-1858 (2017) - [c8]Rong Jiang
, Hossein Noori
, Fa Foster Dai, Jun Fu, Wei Zhou, Yudong Wang:
A low phase noise 8.8 GHz VCO based on ISF manipulation and dual-tank technique. ISCAS 2017: 1-4 - 2016
- [j15]Rong Jiang
, Wei-Min Qian, Zhan-Gong Zhou:
Weighted composite quantile regression for single-index models. J. Multivar. Anal. 148: 34-48 (2016) - 2015
- [j14]Rong Jiang:
Research and Measurement of Software Complexity Based on Wuli, Shili, Renli (WSR) and Information Entropy. Entropy 17(4): 2094-2116 (2015) - [j13]Rong Jiang:
A Novel Risk Metric for Staff Turnover in a Software Project Based on Information Entropy. Entropy 17(5): 2834-2852 (2015) - [j12]Hang Zhao, Wangtu Ato Xu
, Rong Jiang:
The Memetic algorithm for the optimization of urban transit network. Expert Syst. Appl. 42(7): 3760-3773 (2015) - [c7]Fa Foster Dai, Feng Zhao, Rong Jiang
:
Low noise coupling techniques for multi-phase oscillators. ASICON 2015: 1-4 - 2014
- [j11]Rong Jiang
, Wei-Min Qian, Jing-Ru Li:
Testing in linear composite quantile regression models. Comput. Stat. 29(5): 1381-1402 (2014) - [j10]Rong Jiang:
A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy 16(9): 4818-4838 (2014) - [j9]Wen-Jiang Feng, Rong Jiang, Guo-Ling Liu:
Distributed Power Control in Cooperative Cognitive Ad hoc Networks. Int. J. Autom. Comput. 11(4): 412-417 (2014) - [j8]Rong Jiang:
An Information-Entropy-based Risk Measurement Method of Software Development Project. J. Inf. Sci. Eng. 30(5): 1279-1301 (2014) - [j7]Weng-Jiang Feng, Rong Jiang, Peipei Han, Wanli Liao, Haochen He:
Performance Analysis of Cognitive Radio Spectrum Access with Different Primary User Access Schemes. Wirel. Pers. Commun. 75(1): 309-324 (2014) - 2013
- [j6]Rong Jiang
, Zhan-Gong Zhou, Wei-Min Qian, Yong Chen:
Two step composite quantile regression for single-index models. Comput. Stat. Data Anal. 64: 180-191 (2013) - 2012
- [j5]Junsheng Yu, Xia Lei, Rong Jiang, Juan Zhao:
Influence of interlayer on the performance of phosphorescent white organic light-emitting devices. Displays 33(3): 142-145 (2012) - [j4]Wen-Jiang Feng, Xiao-Wei Bi, Rong Jiang:
A novel adaptive cooperative location algorithm for wireless sensor networks. Int. J. Autom. Comput. 9(5): 539-544 (2012) - 2011
- [j3]Rong Jiang, Hong Yan
:
Detection and 2-Dimensional display of short tandem repeats based on signal decomposition. Int. J. Data Min. Bioinform. 5(6): 661-690 (2011) - [c6]Rong Jiang:
Feasibility Analysis on Tax Incentives Policy of Venture Capital. CSISE (1) 2011: 297-302
2000 – 2009
- 2009
- [c5]Yafei Sun, Zhishu Li, Changjie Tang, Wangping Zhou, Rong Jiang:
An Evolving Neural Network for Authentic Emotion Classification. ICNC (2) 2009: 109-113 - [c4]Rong Jiang, Hongzhi Liao, Jiankun Yu, Dehai Zhang, Lihua Chen, Yafei Sun:
An Approach to Analysis and Measurement of the Stability of Web Community Based on Dissipative Structure Theory and Information Entropy. ICNC (6) 2009: 326-329 - 2008
- [j2]Weiqiang Sun, Guowu Xie, Yaohui Jin, Wei Guo, Weisheng Hu
, Xinhua Lin, Min-You Wu, Wentao Li, Rong Jiang, Xueqin Wei:
A cross-layer optical circuit provisioning framework for data intensive IP end hosts. IEEE Commun. Mag. 46(2) (2008) - [j1]Rong Jiang, Hong Yan
:
Segmentation of short human exons based on spectral features of double curves. Int. J. Data Min. Bioinform. 2(1): 15-35 (2008) - [c3]Wangyang Zhang, Wenjian Yu, Zeyi Wang, Zhiping Yu, Rong Jiang, Jinjun Xiong
:
An Efficient Method for Chip-Level Statistical Capacitance Extraction Considering Process Variations with Spatial Correlation. DATE 2008: 580-585 - 2007
- [c2]Muwei Jian
, Junyu Dong, Rong Jiang:
Wavelet-Based Salient Regions and their Spatial Distribution for Image Retrieval. ICME 2007: 2194-2197
1990 – 1999
- 1999
- [c1]Rong Jiang, Deyi Li, Hui Chen:
Time-Series Prediction with Cloud Models in DMKD. PAKDD 1999: 525-529
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-25 17:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint