default search action
Lei Jin 0003
Person information
- affiliation: University of Pittsburgh, School of Information Sciences, PA, USA
- affiliation (former): Tsinghua University, Beijing, China
- not to be confused with: Lei Jin 0002
Other persons with the same name
- Lei Jin — disambiguation page
- Lei Jin 0001 — Arkansas University, Department of Computer Science, Little Rock, AR, USA
- Lei Jin 0002 — University of Pittsburgh, Department of Computer Science, PA, USA (and 1 more)
- Lei Jin 0004 — Texas A&M University, Department of Mathematics and Statistics, Corpus Christi, TX, USA (and 2 more)
- Lei Jin 0005 — Beihang University, School of Astronautics, Beijing, China
- Lei Jin 0006 — Fudan University, Huashan Hospital, Department of Neurosurgery, Shanghai, China
- Lei Jin 0007 — Xiamen University of Technology, College of Environmental Science and Engineering, Xiamen, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Xuechao Zou, Kai Li, Junliang Xing, Yu Zhang, Shiying Wang, Lei Jin, Pin Tao:
DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal From Optical Satellite Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-14 (2024) - [j22]Jiaming Chu, Lei Jin, Yinglei Teng, Jianshu Li, Yunchao Wei, Zheng Wang, Junliang Xing, Shuicheng Yan, Jian Zhao:
UniParser: Multi-Human Parsing With Unified Correlation Representation Learning. IEEE Trans. Image Process. 33: 5159-5171 (2024) - [j21]Lei Jin, Xiaojuan Wang, Xuecheng Nie, Wendong Wang, Yandong Guo, Shuicheng Yan, Jian Zhao:
Rethinking the Person Localization for Single-Stage Multi-Person Pose Estimation. IEEE Trans. Multim. 26: 1436-1447 (2024) - [j20]Zhihao Zhang, Jun Wang, Shengjie Li, Lei Jin, Hao Wu, Jian Zhao, Bo Zhang:
Review and Analysis of RGBT Single Object Tracking Methods: A Fusion Perspective. ACM Trans. Multim. Comput. Commun. Appl. 20(8): 259:1-259:27 (2024) - [c22]Tao Wang, Lei Jin, Zheng Wang, Jianshu Li, Liang Li, Fang Zhao, Yu Cheng, Li Yuan, Li Zhou, Junliang Xing, Jian Zhao:
SynSP: Synergy of Smoothness and Precision in Pose Sequences Refinement. CVPR 2024: 1824-1833 - [c21]Chen Min, Dawei Zhao, Liang Xiao, Jian Zhao, Xinli Xu, Zheng Zhu, Lei Jin, Jianshu Li, Yulan Guo, Junliang Xing, Liping Jing, Yiming Nie, Bin Dai:
DriveWorld: 4D Pre-Trained Scene Understanding via World Models for Autonomous Driving. CVPR 2024: 15522-15533 - [c20]Ziliang Gan, Lei Jin, Lei Nie, Zheng Wang, Li Zhou, Liang Li, Zhecan Wang, Jianshu Li, Junliang Xing, Jian Zhao:
ASQuery: A Query-based Model for Action Segmentation. ICME 2024: i-vi - [c19]Jianqiang Xia, Dianxi Shi, Ke Song, Linna Song, Xiaolei Wang, Songchang Jin, Chenran Zhao, Yu Cheng, Lei Jin, Zheng Zhu, Jianan Li, Gang Wang, Junliang Xing, Jian Zhao:
Unified Single-Stage Transformer Network for Efficient RGB-T Tracking. IJCAI 2024: 1471-1479 - [i11]Chen Min, Dawei Zhao, Liang Xiao, Jian Zhao, Xinli Xu, Zheng Zhu, Lei Jin, Jianshu Li, Yulan Guo, Junliang Xing, Liping Jing, Yiming Nie, Bin Dai:
DriveWorld: 4D Pre-trained Scene Understanding via World Models for Autonomous Driving. CoRR abs/2405.04390 (2024) - [i10]Jian Zhao, Lei Jin, Jianshu Li, Zheng Zhu, Yinglei Teng, Jiaojiao Zhao, Sadaf Gulshad, Zheng Wang, Bo Zhao, Xiangbo Shu, Yunchao Wei, Xuecheng Nie, Xiaojie Jin, Xiaodan Liang, Shin'ichi Satoh, Yandong Guo, Cewu Lu, Junliang Xing, Jane Shengmei Shen:
The SkatingVerse Workshop & Challenge: Methods and Results. CoRR abs/2405.17188 (2024) - 2023
- [j19]Xiaojin Fan, Mengmeng Liao, Jingfeng Xue, Hao Wu, Lei Jin, Jian Zhao, Liehuang Zhu:
Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition. Neurocomputing 522: 89-104 (2023) - [j18]Jiaming Song, Xiaojuan Wang, Mingshu He, Lei Jin:
CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset. Inf. 14(2): 130 (2023) - [j17]Tao Niu, Yinglei Teng, Lei Jin, Panpan Zou, Yiding Liu:
Pruning-and-distillation: One-stage joint compression framework for CNNs via clustering. Image Vis. Comput. 136: 104743 (2023) - [j16]Lei Jin, Xiaojuan Wang, Xuecheng Nie, Luoqi Liu, Yandong Guo, Jian Zhao:
Grouping by Center: Predicting Centripetal Offsets for the Bottom-up Human Pose Estimation. IEEE Trans. Multim. 25: 3364-3374 (2023) - [c18]Zhihao Zhang, Lei Jin, Shengjie Li, Jianqiang Xia, Jun Wang, Zun Li, Zheng Zhu, Wenhan Yang, Pengfei Zhang, Jian Zhao, Bo Zhang:
Modality Meets Long-Term Tracker: A Siamese Dual Fusion Framework for Tracking UAV. ICIP 2023: 1975-1979 - [c17]Tao Wang, Lei Jin, Zhang Wang, Xiaojin Fan, Yu Cheng, Yinglei Teng, Junliang Xing, Jian Zhao:
DecenterNet: Bottom-Up Human Pose Estimation Via Decentralized Pose Representation. ACM Multimedia 2023: 1798-1808 - [c16]Jiaming Chu, Lei Jin, Xiaojin Fan, Yinglei Teng, Yunchao Wei, Yuqiang Fang, Junliang Xing, Jian Zhao:
Single-Stage Multi-human Parsing via Point Sets and Center-based Offsets. ACM Multimedia 2023: 1863-1873 - [i9]Jiaming Chu, Lei Jin, Junliang Xing, Jian Zhao:
Single-stage Multi-human Parsing via Point Sets and Center-based Offsets. CoRR abs/2304.11356 (2023) - [i8]Jian Zhao, Jianan Li, Lei Jin, Jiaming Chu, Zhihao Zhang, Jun Wang, Jiangqiang Xia, Kai Wang, Yang Liu, Sadaf Gulshad, Jiaojiao Zhao, Tianyang Xu, Xuefeng Zhu, Shihan Liu, Zheng Zhu, Guibo Zhu, Zechao Li, Zheng Wang, Baigui Sun, Yandong Guo, Shinichi Satoh, Junliang Xing, Jane Shengmei Shen:
The 3rd Anti-UAV Workshop & Challenge: Methods and Results. CoRR abs/2305.07290 (2023) - [i7]Xuefeng Zhu, Tianyang Xu, Jian Zhao, Jia-Wei Liu, Kai Wang, Gang Wang, Jianan Li, Zhihao Zhang, Qiang Wang, Lei Jin, Zheng Zhu, Junliang Xing, Xiao-Jun Wu:
Evidential Detection and Tracking Collaboration: New Problem, Benchmark and Algorithm for Robust Anti-UAV System. CoRR abs/2306.15767 (2023) - [i6]Xuechao Zou, Kai Li, Junliang Xing, Yu Zhang, Shiying Wang, Lei Jin, Pin Tao:
DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal from Optical Satellite Images. CoRR abs/2308.04417 (2023) - [i5]Jianqiang Xia, Dian-xi Shi, Ke Song, Linna Song, Xiaolei Wang, Songchang Jin, Li Zhou, Yu Cheng, Lei Jin, Zheng Zhu, Jianan Li, Gang Wang, Junliang Xing, Jian Zhao:
Unified Single-Stage Transformer Network for Efficient RGB-T Tracking. CoRR abs/2308.13764 (2023) - [i4]Jiaming Chu, Lei Jin, Junliang Xing, Jian Zhao:
UniParser: Multi-Human Parsing with Unified Correlation Representation Learning. CoRR abs/2310.08984 (2023) - 2022
- [c15]Yiqing Luo, Mingshu He, Xiaojuan Wang, Lei Jin:
between flow and bytes. BigDataService 2022: 179-180 - [c14]Lei Jin, Chenyang Xu, Xiaojuan Wang, Yabo Xiao, Yandong Guo, Xuecheng Nie, Jian Zhao:
Single-Stage is Enough: Multi-Person Absolute 3D Pose Estimation. CVPR 2022: 13076-13085 - [c13]Yabo Xiao, Kai Su, Xiaojuan Wang, Dongdong Yu, Lei Jin, Mingshu He, Zehuan Yuan:
QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query. NeurIPS 2022 - [i3]Yabo Xiao, Xiaojuan Wang, Dongdong Yu, Kai Su, Lei Jin, Mei Song, Shuicheng Yan, Jian Zhao:
AdaptivePose++: A Powerful Single-Stage Network for Multi-Person Pose Regression. CoRR abs/2210.04014 (2022) - [i2]Yabo Xiao, Kai Su, Xiaojuan Wang, Dongdong Yu, Lei Jin, Mingshu He, Zehuan Yuan:
QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query. CoRR abs/2212.07855 (2022) - 2021
- [j15]Xiaojuan Wang, Xinlei Wang, Lei Jin, Renjian Lv, Bingying Dai, Mingshu He, Tianqi Lv:
Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification. IEEE Access 9: 52310-52325 (2021) - [j14]Mingshu He, Xiaojuan Wang, Junhua Zhou, Yuanyuan Xi, Lei Jin, Xinlei Wang:
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection. Secur. Commun. Networks 2021: 6659022:1-6659022:13 (2021) - [j13]Lei Jin, Xiaojuan Wang, Mingshu He, Jingyue Wang:
DRNet: A Depth-Based Regression Network for 6D Object Pose Estimation. Sensors 21(5): 1692 (2021) - [j12]Mingshu He, Xiaojuan Wang, Lei Jin, Bingying Dai, Kaiwenlv Kacuila, Xiaosu Xue:
Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data. Sensors 21(17): 5942 (2021) - [j11]Xiaojuan Wang, Xinlei Wang, Tianqi Lv, Lei Jin, Mingshu He:
HARNAS: Human Activity Recognition Based on Automatic Neural Architecture Search Using Evolutionary Algorithms. Sensors 21(20): 6927 (2021) - [j10]Mingshu He, Xiaojuan Wang, Chundong Zou, Bingying Dai, Lei Jin:
A Commodity Classification Framework Based on Machine Learning for Analysis of Trade Declaration. Symmetry 13(6): 964 (2021) - [j9]Renjian Lyu, Mingshu He, Yu Zhang, Lei Jin, Xinlei Wang:
Network Intrusion Detection Based on an Efficient Neural Architecture Search. Symmetry 13(8): 1453 (2021) - [c12]Mingshu He, Lei Jin, Mei Song:
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning. ICAIS (2) 2021: 305-320 - [i1]Jian Zhao, Gang Wang, Jianan Li, Lei Jin, Nana Fan, Min Wang, Xiaojuan Wang, Ting Yong, Yafeng Deng, Yandong Guo, Shiming Ge, Guodong Guo:
The 2nd Anti-UAV Workshop & Challenge: Methods and Results. CoRR abs/2108.09909 (2021) - 2020
- [j8]Tianqi Lv, Xiaojuan Wang, Lei Jin, Yabo Xiao, Mei Song:
A Hybrid Network Based on Dense Connection and Weighted Feature Aggregation for Human Activity Recognition. IEEE Access 8: 68320-68332 (2020)
2010 – 2019
- 2019
- [c11]Dawei Du, Yue Zhang, Zexin Wang, Zhikang Wang, Zichen Song, Ziming Liu, Liefeng Bo, Hailin Shi, Rui Zhu, Aashish Kumar, Aijin Li, Almaz Zinollayev, Anuar Askergaliyev, Arne Schumann, Binjie Mao, Pengfei Zhu, Byeongwon Lee, Chang Liu, Changrui Chen, Chunhong Pan, Chunlei Huo, Da Yu, Dechun Cong, Dening Zeng, Dheeraj Reddy Pailla, Di Li, Longyin Wen, Dong Wang, Donghyeon Cho, Dongyu Zhang, Furui Bai, George Jose, Guangyu Gao, Guizhong Liu, Haitao Xiong, Hao Qi, Haoran Wang, Xiao Bian, Heqian Qiu, Hongliang Li, Huchuan Lu, Ildoo Kim, Jaekyum Kim, Jane Shen, Jihoon Lee, Jing Ge, Jingjing Xu, Jingkai Zhou, Haibin Ling, Jonas Meier, Jun Won Choi, Junhao Hu, Junyi Zhang, Junying Huang, Kaiqi Huang, Keyang Wang, Lars Sommer, Lei Jin, Lei Zhang, Qinghua Hu, Lianghua Huang, Lin Sun, Lucas Steinmann, Meixia Jia, Nuo Xu, Pengyi Zhang, Qiang Chen, Qingxuan Lv, Qiong Liu, Qishang Cheng, Tao Peng, Sai Saketh Chennamsetty, Shuhao Chen, Shuo Wei, Srinivas S. S. Kruthiventi, Sungeun Hong, Sungil Kang, Tong Wu, Tuo Feng, Varghese Alex Kollerathu, Wanqi Li, Jiayu Zheng, Wei Dai, Weida Qin, Weiyang Wang, Xiaorui Wang, Xiaoyu Chen, Xin Chen, Xin Sun, Xin Zhang, Xin Zhao, Xindi Zhang, Xinyao Wang, Xinyu Zhang, Xuankun Chen, Xudong Wei, Xuzhang Zhang, Yanchao Li, Yifu Chen, Yu Heng Toh, Yu Zhang, Yu Zhu, Yunxin Zhong:
VisDrone-DET2019: The Vision Meets Drone Object Detection in Image Challenge Results. ICCV Workshops 2019: 213-226 - 2018
- [j7]Lei Jin, Chao Li, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. Comput. Secur. 78: 212-230 (2018) - 2016
- [j6]Lei Jin, Xuelian Long, Ke Zhang, Yu-Ru Lin, James B. D. Joshi:
Characterizing users' check-in activities using their scores in a location-based social network. Multim. Syst. 22(1): 87-98 (2016) - [j5]Lei Jin, Ke Zhang, Jianfeng Lu, Yu-Ru Lin:
Towards understanding the gamification upon users' scores in a location-based social network. Multim. Tools Appl. 75(15): 8895-8919 (2016) - 2015
- [j4]Jianfeng Lu, James B. D. Joshi, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. Comput. Secur. 48: 116-130 (2015) - 2014
- [j3]Jianfeng Lu, Dewu Xu, Lei Jin, Jianmin Han, Hao Peng:
On the complexity of role updating feasibility problem in RBAC. Inf. Process. Lett. 114(11): 597-602 (2014) - [c10]Lei Jin, Balaji Palanisamy, James B. D. Joshi:
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. CCS 2014: 1439-1441 - [c9]Lei Jin, Hassan Takabi:
Venue attacks in location-based social networks. GeoPrivacy 2014: 1:1-1:8 - [c8]Lei Jin, Hassan Takabi, Xuelian Long, James B. D. Joshi:
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links. WPES 2014: 59-68 - 2013
- [j2]Lei Jin, James B. D. Joshi, Mohd Anwar:
Mutual-friend based attacks in social network systems. Comput. Secur. 37: 15-30 (2013) - [c7]Xuelian Long, Lei Jin, James Joshi:
Understanding venue popularity in Foursquare. CollaborateCom 2013: 409-418 - [c6]Xuelian Long, Lei Jin, James Joshi:
Towards understanding traveler behavior in Location-based Social Networks. GLOBECOM 2013: 3182-3187 - 2012
- [c5]Lei Jin, Xuelian Long, James B. D. Joshi:
Towards understanding residential privacy by analyzing users' activities in foursquare. BADGERS@CCS 2012: 25-32 - [c4]Xuelian Long, Lei Jin, James Joshi:
Exploring trajectory-driven local geographic topics in foursquare. UbiComp 2012: 927-934 - [c3]Lei Jin, Xuelian Long, James B. D. Joshi, Mohd Anwar:
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems. IRI 2012: 712-717 - 2011
- [j1]Lei Jin, Hassan Takabi, James B. D. Joshi:
Analysing security and privacy issues of using e-mail address as identity. Int. J. Inf. Priv. Secur. Integr. 1(1): 34-58 (2011) - [c2]Lei Jin, Hassan Takabi, James B. D. Joshi:
Towards active detection of identity clone attacks on online social networks. CODASPY 2011: 27-38 - 2010
- [c1]Lei Jin, Hassan Takabi, James B. D. Joshi:
Security and Privacy Risks of Using E-mail Address as an Identity. SocialCom/PASSAT 2010: 906-913
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint