Jian‐Jin Li

ORCID: 0000-0003-0291-9697
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Energy Efficient Wireless Sensor Networks
  • Medical Image Segmentation Techniques
  • Digital Image Processing Techniques
  • Smart Grid Security and Resilience
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Safety Systems Engineering in Autonomy
  • ECG Monitoring and Analysis
  • Context-Aware Activity Recognition Systems
  • IoT-based Smart Home Systems
  • Interconnection Networks and Systems
  • Advanced Image and Video Retrieval Techniques
  • Aerodynamics and Fluid Dynamics Research
  • Neural Networks and Applications
  • Tactile and Sensory Interactions
  • Computer Graphics and Visualization Techniques
  • Genetics and Neurodevelopmental Disorders
  • Robotic Path Planning Algorithms
  • Network Security and Intrusion Detection
  • Graph Theory and Algorithms
  • Vehicle Dynamics and Control Systems
  • Internet of Things and Social Network Interactions

Université Clermont Auvergne
2006-2025

China International Science and Technology Cooperation
2025

Chongqing Medical University
2025

Children's Hospital of Chongqing Medical University
2025

Peking University Shenzhen Hospital
2018-2023

Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes
2009-2020

Centre National de la Recherche Scientifique
2006-2019

Yanshan University
2015-2018

Sun Yat-sen University
2018

Shandong University
2018

Wireless Sensor Network (WSN) is one of the key technologies 21st century, while it a very active and challenging research area. It seems that in next coming year, thanks to 6LoWPAN, these wireless micro-sensors will be embedded everywhere, because 6LoWPAN enables P2P connection between nodes over IPv6. Nowadays different implementations stacks are available so interesting evaluate their performance term memory footprint compliant with RFC4919 RFC4944. In this paper, we present survey on...

10.1109/wicom.2011.6040344 preprint EN 2011-09-01

<title>Abstract</title> Frame selection is a fundamental issue in video action recognition. It aims to minimize temporal redundancy and reduce computational cost. Current frame sampling strategies either rely on uniform based motion, lacking emphasis discriminative frames, or employ complex learning models additional modal information, compromising generalizability. To address these challenges, this paper presents an adaptive strategy. filters redundant frames through motion information...

10.21203/rs.3.rs-5495634/v1 preprint EN cc-by Research Square (Research Square) 2025-01-09

Large Language Models (LLMs) are discovered to suffer from accurately retrieving key information. To address this, we propose Mask-Enhanced Autoregressive Prediction (MEAP), a simple yet effective training paradigm that seamlessly integrates Masked Modeling (MLM) into Next-Token (NTP) enhance the latter's in-context retrieval capabilities. Specifically, MEAP first randomly masks small fraction of input tokens and then directly performs standard next-token prediction autoregressive using...

10.48550/arxiv.2502.07490 preprint EN arXiv (Cornell University) 2025-02-11

Background Pediatric cardiomyopathies are rare but life-threatening conditions with high mortality. Limited data exists on their clinical features and risk factors, especially in Asian populations, highlighting the need for further research this area. Methods This retrospective cohort study analyzed from 212 pediatric patients diagnosed hypertrophic cardiomyopathy (HCM), restrictive (RCM), or phenotype (RP-HCM) at a single center China October 2012 to 2023, follow-up until 31, 2024....

10.3389/fcvm.2025.1541651 article EN cc-by Frontiers in Cardiovascular Medicine 2025-03-31

This paper focuses on the routing protocol for driving safety that vehicle collects state message from roadside sensors in VANET-WSN. Routing Protocol Low Power and Lossy Networks (RPL), a tree-based protocol, adapts naturally to our requirement. But RPL is designed static wireless sensor network, so we need modify fit with high dynamic topology of For first time, utilize Geographical Information (GI) as metric (GI-RPL), which lets timely fashion. We also propose some strategies tuning To...

10.1109/iccis.2013.387 article EN International Conference on Computational and Information Sciences 2013-06-01

Vehicular Ad hoc Networks (VANETs) aim to improve transportation activities that include traffic safety, transport efficiency and even infotainment on the wheels, in which a great number of event-driven messages are needed disseminate region interest timely. However, due nature VANETs, highly dynamic mobility frequent disconnection, data dissemination faces challenges. Inter-Vehicle Communication (IVC) protocols key technology mitigate this issue. Therefore, we propose an infrastructure-less...

10.1109/aina.2016.20 preprint EN 2016-03-01

With the development of communication networks and widespread use mobile terminals, videos are increasingly shared distributed among users. During process, video is recompressed to a certain file size on sending side sent receiving via server. This makes robust watermark with low complexity resist recompression attacks become an important issue address. The proposed watermarking method in this article specially designed for resisting when quantization parameter (QP) greatly increased. In...

10.1109/access.2021.3062468 article EN cc-by-nc-nd IEEE Access 2021-01-01

Precision agriculture has been considered as a new technique to improve agricultural production and support sustainable development by preserving planet resource minimizing pollution. By monitoring different parameters of interest in cultivated field, wireless sensor network (WSN) enables real-time decision making with regard issues such management water resources for irrigation, choosing the optimum point harvesting, estimating fertilizer requirements predicting crop yield more accurately....

10.48550/arxiv.1806.03237 preprint EN other-oa arXiv (Cornell University) 2018-01-01

The last few years have seen substantial progress in the field of smart objects (SOs): their number, diversity, performance and pervasiveness all been quickly increasing this evolution is expected to continue. To best our knowledge, little work has made leverage abundance resources develop assistive devices for Visually Impaired People (VIP). However, we believe that SOs can both enhance traditional functions (i.e. obstacle detection, navigation) offer new ways interacting with environment....

10.1109/access.2020.2976543 article EN cc-by IEEE Access 2020-01-01

This paper studies the detection and isolation problem against False Data Injection Attack (FDIA) for distributed smart grids, by using designed Unknown Input Observer (UIO). Firstly, a simple but classical mathematics model of grid is introduced. Considering covert FDIA, detecting isolating cyber attack in grids. Then, considering disturbance uncertainty system model, adaptive thresholds are computed attack. Furthermore, UIO-based Algorithm proposed, computing observed residuals. Finally,...

10.23919/chicc.2018.8484076 article EN 2018-07-01

The Wireless Sensor Networks (WSN), with their constant evolution, need more and practical effective WSN Management Tools (WMT) for large-scale deployment. Due to the resource constraints of wireless sensor node, it is impossible implement full classical SNMP standard in applications. Therefore, important develop new WMT providing a subset functionalities dedicated by taking into account node. In this paper, we propose named LiveNCM: LiveNode Non-invasive Context-aware, modular Management....

10.1109/ntms.2008.ecp.10 article EN New Technologies, Mobility and Security 2008-11-01

This paper describes a cooperative MANET protocol dedicated to intelligent transport systems, named CIVIC (Communication Inter Vehicule Intelligente et Cooperative). The is an auto-configuration inter-vehicle communication protocol, which supports adhoc and infrastructure networks, contains reactive proactive routing components, adapts different wireless standards. It context-aware reacting vehicle status, road traffic, geographic environment. location-based communication. To improve the...

10.4304/jnw.4.6.445-457 article EN Journal of Networks 2009-08-01

Ocean is a strategic development base of biology, energy, water and metal. It has great potential for development. Underwater vehicle necessary equipment explore the underwater resources. So this project intends to develop equipment. In paper, virtual prototype established based on ADAMS introduced then analyze mechanical model. At last, experiment done in shallow sea. The shows that self-development remotely operated can satisfy with usage requirements.

10.1109/iccar.2018.8384717 article EN 2018-04-01

Though Cyber Physical Systems (CPS) become very popular in last the decade, dependability of CPS is still a critical issue and related survey rare. We try to spell out jigsaw technologies figure technical trends dependable self-managing CPS. This first recalls motivation similar concepts. By analyzing four generic architectures, we summarize common characteristics assurance technologies, propose more environment-in-loop processing flow formal interaction between physical space cyber space....

10.20944/preprints201707.0044.v1 preprint EN 2017-07-17

BACKGROUND: Flexible reinforced laryngeal mask airway (FLMA®) has gained popularity in thyroid surgery, but air leak and displacement are still concerns. METHODS: In this randomized, single-blinded, noninferiority, controlled trial, we randomized patients scheduled for elective radical thyroidectomy to an endotracheal tube (ETT) group or a FLMA group. The primary outcomes were ventilation volume, peak pressure, partial pressure of end-tidal carbon dioxide (Pet co 2 ). Data collected after...

10.1213/ane.0000000000003763 article EN Anesthesia & Analgesia 2018-09-29

This paper presents a novel framework based on system observability to solve the structural vulnerability of cyber-physical systems (CPSs) under attack with application power grids. The adding measurement point method is applied detect angle and voltage bus by detection points between two lines in grid. Then generator dynamic equations are built analyze rotor angles angular velocities generators, simplified Power Management Units (PMUs) observe status generators. According impact series...

10.1109/drpt.2015.7432368 article EN 2015-11-01

The wireless sensor networks (WSN) with their constant evolution, need new management methods to be monitored efficiently by taking into account constraints such as energy consumption, reliability and remote monitoring. Note that WSN has diverse application domains: smart home, care, environmental data collection etc. In order manage a large scale WSN, some network tools (WMTs) are developed. Some of them use SNMP protocol but it is impossible implement the full classical standard on each...

10.1109/afrcon.2009.5308163 article EN AFRICON 2009-09-01
Coming Soon ...