学术活动
  2010-3-24
  2010-2-8
  2010-2-8
  2010-2-5
  2010-1-30
 

许静    Xu Jing







同名作者区分

许静 南开大学许静 江苏大学许静 Unknown
注:C-DBLP的重名区分功能部分使用了清华大学王建勇老师课题组提出的GHOST(GrapH-based framewOrk for name diStincTion)算法,在此表示感谢。
共检索到结果20条  被引3次[注:ScholarSpace内自引数]
查看许静的合作作者    在DBLP中查找该作者文献
查看该作者的单位历史    作者项目历史

论文列表


注:被引数指ScholarSpace内自引数
No. 论文信息 被引数
2019
20 姬秀娟 孙晓卉 许静 . 基于复杂控制流的源代码内存泄漏静态检测. 计算机科学, 2019, (S2): 0
2018
19 卓欣欣 白晓颖 许静 李恩鹏 刘喻 康介恢 宋文莉 . 服务接口测试自动化工具的研究. 计算机研究与发展, 2018, (02): 358-377 0
2017
18 文硕 许静 苑立英 李晓虹 徐思涵 司冠南 . 基于策略推导的访问控制漏洞测试用例生成方法. 计算机学报, 2017, (12): 0
2016
17 过辰楷 许静 司冠南 李恩鹏 徐思涵 . 面向移动应用软件信息泄露的模型检测研究. 计算机学报, 2016, (11): 2324-2344 0
2013
16 姬秀娟 杨巨峰 许静 李晓虹 封磊 . 基于递推链代数与迭代序列敛散性的死循环检测. 计算机学报, 2013, (11): 2245-2257 0
15 许静 司冠南 杨巨峰 文硕 张彪 . 一个网构软件可信实体模型及基于评估的信任度量. 中国科学F辑, 2013, (01): 0
2012
14 司冠南 杨巨峰 许静 . 网构软件可信性演化评估分层Petri网模型. 计算机科学与探索, 2012, (07): 0
13 司冠南 任宇涵 许静 杨巨峰 . 基于贝叶斯网络的网构软件可信性评估模型. 计算机研究与发展, 2012, (05): - 1
12 过辰楷 姬秀娟 许静 . 基于分支混淆算法的符号执行技术. 计算机科学, 2012, (09): - 2
2011
11 练坤梅 许静 田伟 张莹 . SQL注入漏洞多等级检测方法研究. 计算机科学与探索, 2011, (05): 0
2010
10 贾丽 许静 金鑫 田禾 . 基于控件约束关系的Web功能测试系统. 计算机工程, 2010, 36 (05): 46-49 0
9 田伟 许静 彭玉青 . 基于离散评分向量概率分析的CF算法改进研究. 计算机科学, 2010, 37 (05): 181-184 0
8 司冠南 许静 . 基于TPC-C的XML数据库测试方案. 计算机工程, 2010, (19): 0
2009
7 张华川 田杰 许静 . 自相似网络流量模拟的分布式系统的设计与实现. 电子学报, 2009, (S1): 0
2008
6 章丽平 崔国华 喻志刚 雷建云 许静 . Ad Hoc网络中一种基于环状分层结构的组密钥协商协议. 计算机科学, 2008, 35 (10): 61-64 0
2007
5 金鑫 许静 李学孟 谭芳 . 基于XML的工作流引擎的设计与实现. 计算机工程, 2007, 33 (23): 71-74 0
2006
4 许静 冯伟成 周莲英 孙晓明 . 基于部分盲签名的新型电子现金安全系统研究. 计算机工程, 2006, 32 (19): 157-159 0
3 冯伟成 周莲英 许静 孙晓明 . 基于混沌理论的新型不可抵赖数字签名方案. 计算机工程, 2006, 32 (20): 173-174 0
2 许静 刘杰 庞博 王庆人 . OCR性能测试的分布式软件测试系统. 计算机工程, 2006, 32 (08): 79-81 0
2005
1 许静 庞博 王庆人 . 基于结构模式的构件系统测试方法. 计算机科学, 2005, 32 (11): 227-230 0

DBLP检索到的论文列表

No. Paper Inforamtion
2014
1 Zhanglin Peng, Liang Lin, Ruimao Zhang, Jing Xu, Deep boosting: Layered feature mining for general image classification. ICME, 2014
0 Yuanping Zhu, Jing Xu, Zeming Hu, Jiang Wang, Yang Yang, Distribution of uplink inter-cell interference in OFDMA networks with power control. ICC, 2014
-1 Rong Jin, Xianru Du, Kai Zeng, Laiyuan Xiao, Jing Xu, Delay analysis of physical layer key generation in multi-user dynamic wireless networks. ICC, 2014
-2 Guannan Si, Jing Xu, Jufeng Yang, Shuo Wen, An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness. Journal of Systems and Software, 2014, Journal of Systems and Software, 89(): 63-75
-3 Qing-Feng Zhang, Shan-Shan Li, Jing Xu, QScheduler: A Tool for Parallel Query Processing in Database Systems. ICECCS, 2014
-4 Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu, Practical secret key agreement for full-duplex near field communications. ASIACCS, 2014
-5 Jing Xu, Ning Li, Xiao-Jiao Mao, Yu-Bin Yang, Efficient Probabilistic Frequent Itemset Mining in Big Sparse Uncertain Data. PRICAI, 2014
2013
-6 Xiaohui Chen, Wenqing Cheng, Wei Yuan, Wei Liu, Jing Xu, Joint optimization of channel allocation and AP association in variable channel-width WLANs. WCNC, 2013
-7 Jing Xu, Xiang Ding, Guanling Chen, Jill L. Drury, Linzhang Wang, Xuandong Li, A New Method for Automated GUI Modeling of Mobile Applications. MobiQuitous, 2013
-8 Xiaotao Wang, Hua Qian, Weidong Xiang, Jing Xu, Hao Huang, An Efficient ML Decoder for Tail-Biting Codes Based on Circular Trap Detection. IEEE Transactions on Communications, 2013, IEEE Transactions on Communications, 61(4): 1212-1221
-9 Xiaohui Chen, Jing Xu, Wei Yuan, Wei Liu, Wenqing Cheng, Channel assignment in heterogeneous multi-radio multi-channel wireless networks: A game theoretic approach. Computer Networks, 2013, Computer Networks, 57(17): 3291-3299
-10 Bin Zhou, Saisai Ma, Jing Xu, Zhenhong Li, Group-wise channel sensing and resource pre-allocation for LTE D2D on ISM band. WCNC, 2013
-11 Meijiao Duan, Jing Xu, Dengguo Feng, Efficient identity-based strong designated verifier signature schemes. Security and Communication Networks, 2013, Security and Communication Networks, 6(7): 902-911
-12 Ajay Mahimkar, Zihui Ge, Jennifer Yates, Chris Hristov, Vincent Cordaro, Shane Smith, Jing Xu, Mark Stockert, Robust assessment of changes in cellular networks. CoNEXT, 2013
-13 Lei Liu, Jing Xu, Minglei Li, Jufeng Yang, A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach. COMPSAC, 2013
2012
-14 Jufeng Yang, Kai Wang, Jiao Jiao, Jing Xu, An improved binarization method using inter- and intra-block features for natural images. ICIP, 2012
-15 Xiaojin Zheng, Jing Xu, Jiang Wang, Yang Yang, Xiaoying Zheng, Yong Teng, Kari Horneman, McPAO: A Distributed Multi-channel Power Allocation and Optimization Algorithm for Femtocells. MONET, 2012, MONET, 17(5): 648-661
-16 Jufeng Yang, Kai Wang, Jiaofeng Li, Jiao Jiao, Jing Xu, A fast adaptive binarization method for complex scene images. ICIP, 2012
-17 Guoliang Li, Jing Xu, Jianhua Feng, Keyword-based k-nearest neighbor search in spatial databases. CIKM, 2012
-18 Guoliang Li, Jianhua Feng, Jing Xu, DESKS: Direction-Aware Spatial Keyword Search. ICDE, 2012
-19 Guannan Si, Jufeng Yang, Jing Xu, Shuo Wen, Wei Tian, An Evaluation Model for Dependability of Internet-Scale Software on Basis of Bayesian Networks. COMPSAC, 2012
-20 Jing Xu, Rule-based automatic software performance diagnosis and improvement. Perform. Eval., 2012, Perform. Eval., 69(11): 525-550
2011
-21 Dongbin Zhao, Xuerui Bai, Fei-Yue Wang, Jing Xu, Wensheng Yu, DHP Method for Ramp Metering of Freeway Traffic. IEEE Transactions on Intelligent Transportation Systems, 2011, IEEE Transactions on Intelligent Transportation Systems, 12(4): 990-999
-22 Jing Xu, Wen Tao Zhu, Wenting Jin, A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card. Concurrency and Computation: Practice and Experience, 2011, Concurrency and Computation: Practice and Experience, 23(12): 1386-1398
-23 Tao Zhou, Jing Xu, Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 2011, Computer Networks, 55(1): 205-213
-24 Lijun Zu, Yusheng Ji, Liping Wang 0003, Lei Zhong, Fuqiang Liu, Ping Wang, Jing Xu, Joint optimization in multi-user MIMO-OFDMA relay-enhanced cellular networks. WCNC, 2011
-25 Bingtuan Gao, Jianguo Zhao, Ning Xi, Jing Xu, Combined kinematic and static analysis of a cable-driven manipulator with a spring spine. ICRA, 2011
-26 Jing Xu, Wen Tao Zhu, Dengguo Feng, An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 2011, Computer Communications, 34(3): 319-325
-27 Shuangdie Wang, Jiang Wang, Jing Xu, Yong Teng, Kari Horneman, Cooperative component carrier (Re-)selection for LTE-advanced femtocells. WCNC, 2011
-28 Lixi Wang, Jing Xu, Ming Zhao 0002, Yicheng Tu, José A. B. Fortes, Fuzzy Modeling Based Resource Management for Virtualized Database Systems. MASCOTS, 2011
-29 Samir Gaber Sayed, Yang Yang, Jing Xu, BTAC: A Busy Tone Based Cooperative MAC Protocol for Wireless Local Area Networks. MONET, 2011, MONET, 16(1): 4-16
2010
-30 Jing Xu, Ning Xi, Chi Zhang, Quan Shi, Real-time 3D shape measurement system based on single structure light pattern. ICRA, 2010
-31 Jing Xu, Rule-based automatic software performance diagnosis and improvement. Perform. Eval., 2010, Perform. Eval., 67(8): 585-611
-32 Chi Zhang, Ning Xi, Jing Xu, Quan Shi, Calibration of a structure light based windshield inspection system. ICRA, 2010
-33 Jing Xu, Weikai Xu, Lin Wang 0003, Guanrong Chen, Design and simulation of a cooperative communication system based on DCSK/FM-DCSK. ISCAS, 2010
-34 Christian R. Shelton, Yu Fan, William Lam, Joon Lee, Jing Xu, Continuous Time Bayesian Network Reasoning and Learning Engine. Journal of Machine Learning Research, 2010, Journal of Machine Learning Research, 11(): 1137-1140
-35 Yu Fan, Jing Xu, Christian R. Shelton, Importance Sampling for Continuous Time Bayesian Networks. Journal of Machine Learning Research, 2010, Journal of Machine Learning Research, 11(): 2115-2140
2009
-36 C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens, Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software, 2009, Journal of Systems and Software, 82(1): 56-74
-37 Gong Zhang, Wenhua Shi, Jing Xu, Ning Li, Mark J. T. Smith, SAR image despeckling using undecimated directional filter banks and mean shift. ICIP, 2009
2008
-38 Xuerui Bai, Dongbin Zhao, Jianqiang Yi, Jing Xu, Ramp metering based on on-line ADHDP (lambda) controller. IJCNN, 2008
-39 Haitao Xiong, Jing Xu, Ping Wang, Frequency-domain equalization and diversity combining for demodulate-and-forward cooperative systems. ICASSP, 2008
-40 Jing Xu, Ming Zhao 0002, José A. B. Fortes, Robert Carpenter, Mazin S. Yousif, Autonomic resource management in virtualized data centers using fuzzy logic-based approaches. Cluster Computing, 2008, Cluster Computing, 11(3): 213-227
-41 Jing Xu, Thomas L. Griffiths, How memory biases affect information transmission: A rational analysis of serial reproduction. NIPS, 2008
2006
-42 Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng, Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS, 2006
-43 Qian Wang, Dan Xu, Jing Xu, Zhiyong Bu, A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. IPCCC, 2006
-44 Jing Xu, Haifeng Wang, Shixin Cheng, Ming Chen 0001, Zhiyong Bu, Adaptive frequency-domain interference cancellation and channel equalizer for MIMO-CP-CDMA systems. WCNC, 2006
2003
-45 Jian-Xin Xu, Jing Xu, A new fuzzy logic learning control scheme for repetitive trajectory tracking problems. Fuzzy Sets and Systems, 2003, Fuzzy Sets and Systems, 133(1): 57-75
-46 Jing Xu, Haifeng Wang, Ming Chen 0001, Shixin Cheng, A novel BLAST detection algorithm based instantaneous error ordering. ICC, 2003

合作作者列表

1 任宇涵 [13]  
2 冯伟成 [4]   [3]  
3 刘喻 [19]  
4 刘杰 [2]  
5 卓欣欣 [19]  
6 司冠南 [8]   [14]  [13]  [15]  [17]  [18]  
7 周莲英 [4]   [3]  
8 喻志刚 [6]  
9 姬秀娟 [12]   [16]  [20]  
10 孙晓卉 [20]  
11 孙晓明 [4]   [3]  
12 宋文莉 [19]  
13 封磊 [16]  
14 崔国华 [6]  
15 庞博 [2]   [1]  
16 康介恢 [19]  
17 张华川 [7]  
18 张彪 [15]  
19 张莹 [11]  
20 彭玉青 [9]  
21 徐思涵 [17]   [18]  
22 文硕 [15]   [18]  
23 李学孟 [5]  
24 李恩鹏 [17]   [19]  
25 李晓虹 [16]   [18]  
26 杨巨峰 [14]   [13]  [15]  [16]  
27 王庆人 [2]   [1]  
28 田伟 [9]   [11]  
29 田杰 [7]  
30 田禾 [10]  
31 白晓颖 [19]  
32 章丽平 [6]  
33 练坤梅 [11]  
34 苑立英 [18]  
35 谭芳 [5]  
36 贾丽 [10]  
37 过辰楷 [12]   [17]  
38 金鑫 [5]   [10]  
39 雷建云 [6]  

单位历史信息

南开大学信息技术科学学院 (2009--2013)
南开大学计算机与控制工程学院 (2013--2018)

说明: 作者的单位历史信息是根据本系统中论文的单位信息采用算法自动计算得到,部分信息可能不准确,仅供参考。