Jie Liu

ORCID: 0000-0002-7305-5569
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Malware Detection Techniques
  • Multimodal Machine Learning Applications
  • Job Satisfaction and Organizational Behavior
  • Advanced Neural Network Applications
  • Advanced Computational Techniques and Applications
  • Blockchain Technology Applications and Security
  • Cloud Computing and Resource Management
  • Service-Oriented Architecture and Web Services
  • Security and Verification in Computing
  • Caching and Content Delivery
  • Robotics and Sensor-Based Localization
  • Web Data Mining and Analysis
  • Domain Adaptation and Few-Shot Learning
  • Video Analysis and Summarization
  • Text and Document Classification Technologies
  • Employee Performance and Management
  • Model-Driven Software Engineering Techniques
  • Hydrocarbon exploration and reservoir analysis
  • EFL/ESL Teaching and Learning
  • Advanced Data Storage Technologies
  • Magnetic Field Sensors Techniques
  • Image and Object Detection Techniques
  • Workplace Health and Well-being

Henan University Huaihe Hospital and Huaihe Clinical Institute
2022-2025

Central South University
2025

King Abdullah University of Science and Technology
2024

Institute of Information Engineering
2023

Chinese Academy of Sciences
2023

Baidu (China)
2022

Shanxi Normal University
2022

Taizhou Vocational and Technical College
2022

Tencent (China)
2017-2019

Microsoft (United States)
2012-2018

In existing visual representation learning tasks, deep convolutional neural networks (CNNs) are often trained on images annotated with single tag, such as ImageNet. However, tag annotation cannot describe all important contents of one image, and some useful information may be wasted during training. this work, we propose to train CNNs from multiple tags, enhance the quality CNN model. To end, build a large-scale multi-label image database 18M 11K categories, dubbed <italic...

10.1109/access.2019.2956775 article EN cc-by IEEE Access 2019-01-01

This investigation delves into the ambidextrous impacts that shared leadership imparts on resilience of employees through incorporation Job Demands-Resources framework to delineate underlying mechanisms. Furthermore, it explores organizational boundary factors enhance employees' resilience, so as explore ways improve resilience. research chose use an online questionnaire at two time points with a analysis 246 valid questionnaires. Surveys were disseminated electronically esteemed third-party...

10.3389/fpsyg.2025.1441660 article EN cc-by Frontiers in Psychology 2025-02-20

This study aimed to investigate the impact of work environment, emotional intelligence, and empathy fatigue on nurse presenteeism examine mediating roles intelligence fatigue. employed a cross-sectional research design conducted questionnaire survey from April July 2024 among 1,375 nurses (aged 18–24, 25–34, 35–44, ≥ 45 years) six tertiary hospitals in Henan Province. The included demographic characteristics, Nursing Practice Environment Scale, Emotional Intelligence Empathy Fatigue Stanford...

10.1186/s12912-025-02905-4 article EN cc-by-nc-nd BMC Nursing 2025-03-18

Undergraduate nursing students' interpersonal skills are closely related to their clinical competence, yet research on the effects of sensitivity and its mediating mechanisms is not found. To investigate undergraduate role self-efficacy subjective well-being. This study was a cross-sectional design conducted in Henan Province, China, from March April 2024, using convenience sampling method, questionnaires Interpersonal Competence Questionnaire, Sensitivity Scale, General Self-Efficacy Index...

10.1186/s12912-025-02954-9 article EN cc-by-nc-nd BMC Nursing 2025-04-01

Background Presenteeism is defined as the behavior of people who insist on attending work despite complaints ill health that should prompt rest and absence from work. Due to heavy workloads irreplaceable duties nursing service, nurses are a typical representative group suffering presenteeism. Although more scholars have recently begun focusing presenteeism, an abundant number studies tended focus presenteeism's external objective factors. There is, thus, lack based variables related...

10.3389/fpubh.2022.930083 article EN cc-by Frontiers in Public Health 2022-06-28

Pore-network models have become a critical tool in the study of fluid flow geo-energy researches over last few decades, and accuracy pore-network modeling results highly depends on extraction pore networks. Traditional methods are based pixels require images with high quality. Here, pixel-free method called flashlight search medial axis algorithm is proposed for continuous space. The domain two-dimensional space line, whereas surface searched three-dimensional scenario. Thus, follows...

10.46690/ager.2024.07.05 article EN ADVANCES IN GEO-ENERGY RESEARCH 2024-06-11

Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which labor-intensive subject to inconsistencies when acquired manually. In this work, we propose novel self-supervised approach for edge that employs multi-level, multi-homography transfer annotations from synthetic real-world...

10.48550/arxiv.2401.02313 preprint EN other-oa arXiv (Cornell University) 2024-01-01

Fuel cells are a promising power source for future data centers, offering high energy efficiency, low greenhouse gas emissions, and reliability. However, due to mechanical limitations related fuel delivery, slow adjust sudden increases in center demands, which can result temporary shortfalls. To mitigate the impact of shortfalls, prior work has proposed either perform capping by throttling servers, or leverage storage devices (ESDs) that temporarily provide enough make up shortfall while...

10.1109/hpca.2016.7446085 article EN 2016-03-01

Hyperautomation is a true digital transformation using advanced techniques and automates complicated business processes. Blockchain-based networks have hyper-automation turbo-boost power as they create tamper-proof, real-time data exchange networks. The study aims to examine the impact of blockchain on performance Chinese electronics manufacturers through green supply chain circular economy in environment. Respondents (n = 376) present were made up employees from 300 China-based companies....

10.1080/17517575.2023.2204305 article EN Enterprise Information Systems 2023-05-04

UDDI registration center provides a set of management mechanism for Web services providers to publish their service and consumers inquire what they needs. It solves the problem description, discovery Integration. graph is semantic index established on according logical relations between web [1,2]. can enhance efficiency. jUDDI an open source Java implementation specification Services. Based research graph, this article takes as example show how traditional registry be extended so supporting graph.

10.1109/icws.2007.74 article EN 2007-07-01

Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine obfuscation emerging as powerful technique protection. However, the current protection are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program construct simpler that functionally equivalent but easier analyze. This paper presents DSA-VMP, novel VM-based technique, address issue of attacks. Our design goal exploit data flows...

10.1109/uic-atc.2017.8397540 article EN 2017-08-01

Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from detection and thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face challenge low coverage as not all software execution paths behavior will be exposed at specific profiling runs. As a result, these often fail discover hidden malicious patterns. This paper introduces SEEAD, novel generic...

10.1109/trustcom/bigdatase/icess.2017.246 article EN 2017-08-01

Image matching is at the base of many computer vision problems, such as object recognition or image stitching. Standard SIFT provides poor performance when images under viewpoint change conditions and with similar corners. Hence, we propose a algorithm combine regional SSDA simplified algorithm. We demonstrate through experiments that our yields better in feature points. Besides, cut down about half time was originally needed tested images.

10.1109/iccect.2012.78 article EN International Conference on Control Engineering and Communication Technology 2012-12-01

With the evolution of disease patterns and continuous pursuit persons for high-quality nursing services, new nurses are reserve talents team shoulder a major mission. However, due to their low work performance high turnover rate, this is not conducive stable development teams, it urgent solve problem. The purpose study was explore effect readiness on nurses, focusing mediating role organizational justice professional identity.

10.1186/s12912-024-02420-y article EN cc-by-nc-nd BMC Nursing 2024-10-16

For feature point detection with variable scale, rotation, illumination and 3D view port, a tracking method combining scale invariant transform (SIFT) KLT (Kanade-Lucas-Tomasi) is proposed in this paper. SIFT improved it used to detect points of image, then track the continuously. In order verify feasibility method, simulation experiments are carried out real scene image sequences different complexity using better results obtained more stable than conventional method.

10.1117/12.838618 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2009-11-04

General detectors follow the pipeline that feature maps extracted from ConvNets are shared between classification and regression tasks. However, there exists obvious conflicting requirements in multi-orientation object detection is insensitive to orientations, while quite sensitive. To address this issue, we provide an Encoder-Decoder architecture, called Rotated Feature Network (RFN), which produces rotation-sensitive (RS) for rotation-invariant (RI) classification. Specifically, Encoder...

10.48550/arxiv.1903.09839 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Along with the surging service demands in cloud, power provision infrastructure of Internet Data Centers (IDCs) has brought dramatically increasing capital cost. To enlarge size IDCs lowest cost, management computing facilities attracted many attentions recent. A large portion applications running on data centers are data-intensive and throughput-preferredMapReduce is one them enjoying widely deployment. However critical peak problem MapReduce clusters, which actually limits cluster's size,...

10.1145/2349896.2349899 article EN 2012-07-23

Situation awareness is a kind of the third generation information security technology, which aims to provide global views cyberspace for administrators.A framework cyber situation based on data mining proposed in this paper.The can be viewed from two perspectives, one flow, presents abstracting data, and other logic view, procedure awareness.The framework's core component correlation state machine, an extension machine.The machine structure achieving awareness, created technology...

10.2991/iccia.2012.62 article EN cc-by-nc 2012-01-01
Coming Soon ...