Jiangang Yang

ORCID: 0000-0003-2560-1622
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Glaucoma and retinal disorders
  • Network Packet Processing and Optimization
  • Advanced Neural Network Applications
  • Network Traffic and Congestion Control
  • Retinal and Optic Conditions
  • Advanced Data Compression Techniques
  • Image Enhancement Techniques
  • Corneal Surgery and Treatments
  • Mathematical and Theoretical Analysis
  • Bioinformatics and Genomic Networks
  • Semantic Web and Ontologies
  • Image Processing Techniques and Applications
  • Optimization and Packing Problems
  • COVID-19 diagnosis using AI
  • Software-Defined Networks and 5G
  • Retinal Diseases and Treatments
  • Immunotherapy and Immune Responses
  • Image Retrieval and Classification Techniques
  • Machine Learning and Data Classification
  • Remote Sensing and Land Use
  • Robotics and Sensor-Based Localization
  • Advanced Image Processing Techniques
  • Caching and Content Delivery

Northwest University
2024

Fudan University
2023

Institute of Microelectronics
2023

Chinese Academy of Sciences
2023

University of Chinese Academy of Sciences
2020-2023

Nanyang Technological University
2023

Zhejiang University
2004-2017

Ningbo University of Technology
2005-2017

Hangzhou Dianzi University
2015

Xi'an Jiaotong University
2008

Existing enhancement methods are empirically expected to help the high-level end computer vision task: however, that is observed not always be case in practice. We focus on object or face detection poor visibility enhancements caused by bad weathers (haze, rain) and low light conditions. To provide a more thorough examination fair comparison, we introduce three benchmark sets collected real-world hazy, rainy, low-light conditions, respectively, with annotated objects/faces. launched UG <sup...

10.1109/tip.2020.2981922 article EN IEEE Transactions on Image Processing 2020-01-01

Money laundering (ML) involves moving illicit funds, which may be linked to drug trafficking or organized crime, through a series of transactions accounts disguise origin ownership. China is facing severe challenge on money with an estimated 200 billion RMB laundered annually. Decision tree method used in this paper create the determination rules risk by customer profiles commercial bank China. A sample twenty-eight customers four attributes induced and validate decision method. The result...

10.1109/icmlc.2007.4370155 article EN International Conference on Machine Learning and Cybernetics 2007-08-01

The problem of learning label rankings is receiving increasing attention from machine and data mining community. Its goal to learn a mapping instances over finite number labels. In this paper, we devote giving an overview the state-of-the-art in area ranking, providing basic taxonomy ranking algorithms. Specifically, classify these algorithms into four categories, namely decomposition methods, probabilistic similarity-based other methods. We pay particular latest advances each. Also, discuss...

10.4304/jcp.9.3.557-565 article EN Journal of Computers 2014-03-01

10.4156/ijact.vol3.issue4.16 article EN International Journal of Advancements in Computing Technology 2011-05-31

In traditional Active Queue Management algorithms, e.g. RED, each flow, defined with the source and destination IP address of packets, fairly contends for cache bottleneck queues. However a malicious flow cannot be identified. And it enables potential network-layer attacks, flooding Denial-of-Service (DoS) attack low-rate DoS attack. this letter, we propose new scheme using flows trust values to defend against attacks. Different from previous schemes, employs safeguard legitimate flows. A...

10.1109/lcomm.2013.022713.122652 article EN IEEE Communications Letters 2013-05-01

Despite exciting achievements with some malignancies, immunotherapy for hypoimmunogenic cancers, especially glioblastoma (GBM), remains a formidable clinical challenge. Poor immunogenicity and deficient immune infiltrates are two major limitations to an effective cancer-specific response. Herein, we propose that injectable signal-amplifying nanocomposite/hydrogel system consisting of granulocyte-macrophage colony-stimulating factor imiquimod-loaded antigen-capturing nanoparticles can...

10.1016/j.apsb.2023.06.010 article EN cc-by-nc-nd Acta Pharmaceutica Sinica B 2023-06-20

Active Queue Management is an effective way to improve the TCP's performance. However, due existence of non-adaptive flows, most previous schemes cannot achieve efficiency, fairness, and easy-to-deploy simultaneously. In this paper, a novel scheme, named LRURC, proposed fairness among different flows reduce flow completion time when high-bandwidth arise. Motivated by CHOKe algorithm, LRURC adopts sample-match mechanism identify flows. Furthermore, least-recently-used introduced manage...

10.1109/lcomm.2015.2401559 article EN IEEE Communications Letters 2015-02-09

Among IP traceback techniques, deterministic packet marking (DPM) can locate the ingress border routers of destination domains with sound effectiveness and robustness. Yet DPM is inefficient to trace attack origins remote domains. A novel mechanism, across-domain (ADDPM), for proposed. It uses 30-bit space in header reserved fragmented traffic. Three markings are recorded into a at both router source domain respectively. Besides routers' addresses, AS number also marked. The victim origin by...

10.1109/chinacom.2007.4469407 article EN 2007-08-01

Denial-of-service (DoS) attacks is a major threat to Internet security. Among numerous defense techniques, recently architecture-level capabilities scheme promising one. As typical and comprehensive scheme, traffic validation architecture (TVA) tries limit DoS essentially completely. Yet its effectiveness suffers from new kind of attacks, denial-of-capability (DoC), which takes place in the connection-setup step when clients send requests for capabilities. To overcome DoC potential attack...

10.1109/nas.2007.38 article EN 2007-07-01

10.3724/sp.j.1146.2007.00460 article EN JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2011-04-11

Recent studies have shown that deep neural networks are sensitive to visual blur. This vulnerability raises concerns about the robustness of learning-based methods in safety-critical applications, such as autonomous driving and industrial inspection. Although many demonstrated potential enhance vision tasks blurry scenes, a standard benchmark for comparing validating their effectiveness is still lacking. To address this, we propose new comprehensive evaluation recognition scenes. The dataset...

10.1117/1.jei.32.6.063022 article EN Journal of Electronic Imaging 2023-12-05

<title>Abstract</title> Objectives To analyze the influence of behavioral factors associated with COVID-19 infection on occurrence acute angle closure (AAC). Methods A multicenter hospital-based study was conducted at 23 ophthalmic centers in 17 provincial-level regions across China to recruit patients confirmed AAC during post-lockdown time (P-TOC) from Dec 7, 2022, Jan 17, 2023, and three lockdown (TOC) periods, which included TOC-2022 (Sep 2022 - 6, 2022), TOC-2021(Sep 2021 2022) TOC-2020...

10.21203/rs.3.rs-5000321/v1 preprint EN cc-by Research Square (Research Square) 2024-10-22

To analyze the influence of daily activity-related factors associated with COVID-19 infection on occurrence acute angle closure (AAC). A multicenter hospital-based study was conducted at 23 ophthalmic centers in 17 provincial-level regions across China to recruit patients confirmed AAC during post-lockdown time (P-TOC) from Dec 7, 2022, Jan 17, 2023, and three lockdown (TOC) periods, which included TOC-2022 (Sep 2022 - 6, 2022), TOC-2021(Sep 2021 2022) TOC-2020 2020 2021). Patient...

10.1186/s12886-024-03769-z article EN cc-by-nc-nd BMC Ophthalmology 2024-12-24

Background Understanding the structure of complex networks is a continuing challenge, which calls for novel approaches and models to capture their reveal mechanisms that shape networks. Although various topological measures, such as degree distributions or clustering coefficients, have been proposed characterize network from many different angles, comprehensive intuitive representation large allows quantitative analysis still difficult achieve. Methodology/Principal Findings Here we propose...

10.1371/journal.pone.0019784 article EN cc-by PLoS ONE 2011-05-17

Spatial epidemiology, as an important branch of is attracting people's attention increasingly. assessment evaluation, a non-typical research point spatial still our in the field epidemiology. However, little on behavior analysis about how people go to doctor exists, which emphasized this paper from perspective. Meanwhile, real situation also compared with two proposed trends (i.e., trend influenced by distance, familiarity degree) taking Ningbo city, Zhejiang province, China example.

10.1109/icmlc.2017.8107782 article EN 2017-07-01

A novel packet marking scheme is proposed to defend against network or bandwidth DDoS attacks, especially where malicious packets do not target the victim directly. recent study shows that packet-level symmetry exists in legitimate Internet traffic while flooding often exhibits asymmetry. Our utilizes asymmetry differentiate and traffic. When a destination host transmitted from router, score, ratio of received over last interval, calculated recorded into packet's header additively. Malicious...

10.1109/chinacom.2007.4498433 article EN 2007-08-01

We would like to welcome you the International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2017), which is held in Ningbo, China, July 9–12, 2017. ICWAPR an ongoing stimulating research event emphasizing a unique synergy between area of pattern recognition wavelet analysis. ICWAPR2017 14th series international conferences theory applications formerly known as "International Its Applications (ICWAA)". The first four were in, respectively, Guangzhou (1999), Hong Kong (2001),...

10.1109/icwapr.2017.8076647 article EN 2017-07-01

10.1631/jzus.2004.1466 article EN Journal of Zhejiang University. Science A 2004-09-30
Coming Soon ...