
Jie Su
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j21]Qian Shi, Jie Su, Georg Heygster, Jiuxin Shi, Lianzhong Wang, Lizhong Zhu, Quanli Lou, Valentin Ludwig:
Step-by-Step Validation of Antarctic ASI AMSR-E Sea-Ice Concentrations by MODIS and an Aerial Image. IEEE Trans. Geosci. Remote. Sens. 59(1): 392-403 (2021) - 2020
- [j20]Jie Su
, Xuchao Guo, Chengqi Liu, Lin Li:
A New Trend of Quantum Image Representations. IEEE Access 8: 214520-214537 (2020) - [j19]Xuchao Guo, Han Zhou, Jie Su, Xia Hao, Zhan Tang, Lei Diao, Lin Li:
Chinese agricultural diseases and pests named entity recognition with multi-scale local context features and self-attention mechanism. Comput. Electron. Agric. 179: 105830 (2020) - [j18]Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan
, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, Omer Rana, Lizhe Wang, Maciej Koutny, Rajiv Ranjan:
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey. ACM Comput. Surv. 53(4): 82:1-82:47 (2020) - [j17]Zixuan Li, Jiechen Zhao, Jie Su, Chunhua Li, Bin Cheng
, Fengming Hui, Qinghua Yang
, Lijuan Shi:
Spatial and Temporal Variations in the Extent and Thickness of Arctic Landfast Ice. Remote. Sens. 12(1): 64 (2020) - [j16]Jie Su, Yinming Jie, Xiaokai Niu, Chang Liu, Xuan Liu:
Mechanical Behavior of Tunnel Lining with Cracks at Different Positions. Symmetry 12(2): 194 (2020) - [j15]Yue Sun, Sijie Niu
, Xizhan Gao
, Jie Su, Jiwen Dong, Yuehui Chen
, Li Wang
:
Adaptive-Guided-Coupling-Probability Level Set for Retinal Layer Segmentation. IEEE J. Biomed. Health Informatics 24(11): 3236-3247 (2020) - [c26]Jie Su, Hairui Hao, Hongjie Liang:
Retrieval of Arctic Sea Ice Surface Melt Onset In 2016 From FY-3B/MWRI Data. IGARSS 2020: 3012-3015
2010 – 2019
- 2019
- [j14]Yisha Lan
, Yimin Ding, Xin Luo, Yanzhao Zhang, Chenxi Huang, E. Y. K. Ng, Weihong Huang, Xuezhong Zhou
, Jie Su, Yonghong Peng
, Zhicheng Wang, Yongqiang Cheng
, Wenliang Che:
A Clustering Based Transfer Function for Volume Rendering Using Gray-Gradient Mode Histogram. IEEE Access 7: 80737-80747 (2019) - [j13]Xuchao Guo
, Jie Su
, Han Zhou, Chengqi Liu, Jing Cao, Lin Li
:
Community Detection Based on Genetic Algorithm Using Local Structural Similarity. IEEE Access 7: 134583-134600 (2019) - [j12]Jie Su, Jingfeng Gu, Xuchao Guo, Chengqi Liu, Xuesong Bo, Xiaoxue Liu, Han Zhou, Jing Cao, Shuhan Lu, Yinwei You, Lin Li:
A method for recognition of locust age with few observations based on spectral analysis combined with chemical analysis. Comput. Electron. Agric. 162: 450-458 (2019) - [j11]Jie Su, Jun Huang:
Analysis on the tourism resource evaluation factors based on grey relational analysis - Taking Guizhou minority areas as an example. J. Comput. Methods Sci. Eng. 19(4): 1093-1099 (2019) - [c25]Jie Su, Yi Cao, Yuehui Chen:
Privacy Preservation Based on Key Attribute and Structure Generalization of Social Network for Medical Data Publication. ICIC (1) 2019: 388-399 - [c24]Jie Su, Qian Shi, Ping Chen, Hongjie Liang:
The Coupling Characteristics of Arctic Seaice Concentration and Seaice Motion in Winter. IGARSS 2019: 4020-4023 - [c23]Jie Su, Xiaohai He, Linbo Qing, Yanmei Yu, Shengyu Xu, Yonghong Peng:
A New Discriminative Feature Learning for Person Re-Identification Using Additive Angular Margin Softmax Loss. UCET 2019: 1-4 - [i2]Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, Omer Rana, Lizhe Wang, Rajiv Ranjan:
Orchestrating Development Lifecycle of Machine Learning Based IoT Applications: A Survey. CoRR abs/1910.05433 (2019) - [i1]Jie Su:
Wasserstein Distance Guided Cross-Domain Learning. CoRR abs/1910.07676 (2019) - 2018
- [j10]Jie Su
, Linbo Qing, Xiaohai He
, Hang Zhang
, Jing Zhou, Yonghong Peng:
A New Regularized Matrix Discriminant Analysis (R-MDA) Enabled Human-Centered EEG Monitoring Systems. IEEE Access 6: 13911-13920 (2018) - [j9]Xiang Chen
, Linbo Qing, Xiaohai He
, Jie Su
, Yonghong Peng:
From Eyes to Face Synthesis: a New Approach for Human-Centered Smart Surveillance. IEEE Access 6: 14567-14575 (2018) - [j8]Xuguang Wang
, Jiale Quan, Jie Su:
CB-MLE: Time-Delay Estimation Method for SISO Delay Systems. IEEE Access 6: 65721-65728 (2018) - [j7]Xiaokai Niu, Dingli Zhang, Jie Su, Hong Guo:
Parameter Optimization on the Forced Ventilation of Symmetric Tunnel Construction Based on the Super-Short Bench-Cut Method. Symmetry 10(2): 49 (2018) - [j6]Jie Su, Junfeng Wu, Peng Cheng
, Jiming Chen
:
Autonomous Vehicle Control Through the Dynamics and Controller Learning. IEEE Trans. Veh. Technol. 67(7): 5650-5657 (2018) - [c22]Jie Su, Jie Lian:
The Optimal Loan Decision Between Small Enterprises and Banks Under Government's Subsidy and Supervision using Genetic Algorithms. ICNC-FSKD 2018: 1400-1406 - [c21]Qian Shi, Jie Su:
Retrieval and Validation of Sea Ice Concentration from AMSR-E/AMSR2 in Polar Regions. IGARSS 2018: 7093-7096 - [c20]Yanan Song, Junlin Chen, Yu Yang, Chuanliang Jia, Jie Su:
A dual-channel supply chain model considering supplier's mental accounting and retailer's fairness concerns. ITQM 2018: 347-355 - 2017
- [j5]Jie Su, Shuai Liu, Jinming Song:
A segmentation method based on HMRF for the aided diagnosis of acute myeloid leukemia. Comput. Methods Programs Biomed. 152: 115-123 (2017) - [j4]Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang:
Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov. Int. J. Netw. Secur. 19(6): 1036-1043 (2017) - [c19]Jie Su, Ya-Ning Zhang:
Application of BP neural network optimization algorithm based on genetic algorithm in credit risk early-warning of commercial bank. ICNC-FSKD 2017: 487-491 - [c18]Lian Pan, Jie Su, Hanwu Wang:
Fairness maintenance in social regional resource allocation management. ICNC-FSKD 2017: 2419-2423 - [c17]Jie Su, Jianping He, Peng Cheng, Jiming Chen:
Actuator fault diagnosis of a Hexacopter: A nonlinear analytical redundancy approach. MED 2017: 413-418 - 2015
- [j3]Julian Gingold
, Ed Coakley, Jie Su, Dung-Fang Lee
, Zerlina Lau, Hongwei Zhou, Dan Felsenfeld, Christoph Schaniel, Ihor Lemischka:
Distribution Analyzer, a methodology for identifying and clustering outlier conditions from single-cell distributions, and its application to a Nanog reporter RNAi screen. BMC Bioinform. 16: 225:1-225:20 (2015) - 2012
- [c16]Jie Su, Junpeng Bao:
Measuring UML Model Similarity. ICSOFT 2012: 319-323 - [c15]Junpeng Bao, Bin Tao, Jie Su, Hui He:
Data Mining Service Architecture - An Exploration on Self-organizing Software. ICSOFT 2012: 463-467 - 2011
- [c14]YuQing Miao, Xiaohua Zhang, Kongling Wu, Jie Su:
An Efficient Algorithm for Privacy Preserving Maximal Frequent Itemsets Mining. PAAP 2011: 115-118 - 2010
- [c13]Xu-Guang Wang, Jie Su, Hai-Yan Cheng:
Harris feature vector descriptor. ICMLC 2010: 512-517 - [c12]Jun Xiao, Xing Song, Jie Su, Xinhe Xu:
Gait Planning Research for Biped Robot with Heterogeneous Legs. PRICAI 2010: 693-698
2000 – 2009
- 2009
- [c11]Ya-Hui Liu, Qing-Xuan Jia, Han-Xu Sun, Jin-Ling Zhang, Jie Su:
A Geometry Calibration and Visual Seamlessness Method Based on Multi-projector Tiled Display Wall. CAR 2009: 450-453 - [c10]Jie Su, Aihua Li:
Simulated Annealing Approach for the Constrained Shortest Path with Fuzzy Arc and Node Weights. CSIE (4) 2009: 754-758 - [c9]JunPeng Yuan, Jie Su, Cheng Su:
A Novel Reduction Algorithm Based on Expert Knowledge. ICESS 2009: 536-540 - 2008
- [c8]Peili Qiao, Tong Wang, Jie Su:
An improved clone selection immune algorithm. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730O - [c7]Peili Qiao, Tong Wang, Jie Su:
An immunity-based model for dynamic distributed intrusion detection. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730P - [c6]Jie Su, Ya-Hui Liu:
Distributed intrusion detection system based on grid security model. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 697306 - 2006
- [j2]Gangmin Ning, Jie Su, Yingqi Li, Xiaoying Wang, Chenghong Li, Weimin Yan, Xiaoxiang Zheng:
Artificial neural network based model for cardiovascular risk stratification in hypertension. Medical Biol. Eng. Comput. 44(3): 202-208 (2006) - [c5]Peili Qiao, Jie Su, Ya-Hui Liu:
Distributed intrusion detection system based on fuzzy rules. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410F - [c4]Xiucui Guan, Jie Su:
Further Research on Node Based Bottleneck Improvement Problem for Multicut. ICIC (1) 2006: 895-900 - [c3]Jie Su, Xiucui Guan:
Multi-objective Optimal Strategy for Individual Consumption-Investment with Fuzzy Coefficients. ICIC (1) 2006: 919-924 - 2005
- [c2]Peili Qiao, Jie Su, Chengwei Sun:
Distributed intrusion detection system based on ARTIS. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 356-363 - [c1]Jie Su, JunPeng Yuan, Qiang Han, Jin Huang:
A Fuzzy Approach for Equilibrium Programming with Simulated Annealing Algorithm. FSKD (2) 2005: 945-949
1990 – 1999
- 1998
- [j1]Jie Su, Aiqun Hu, Zhenya He:
Solving a kind of nonlinear programming problems via analog neural networks. Neurocomputing 18(1-3): 1-9 (1998)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-23 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint