default search action
Shang Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Song Wang, Zhixia Richard Li, Jia Hu, Jin Xu, Shang Jiang:
Traffic Conflict Forecasting and Avoidance System Under Automated Driving System Disengagement: A Non-Intrusive Prototype Design. IEEE Trans. Intell. Transp. Syst. 25(3): 2394-2412 (2024) - [c10]Shuai Wang, Siye Wang, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang:
RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. CSCWD 2024: 145-150 - [i2]Xinrun Xu, Zhanbiao Lian, Yurong Wu, Manying Lv, Zhiming Ding, Jin Yan, Shang Jiang:
A Multi-constraint and Multi-objective Allocation Model for Emergency Rescue in IoT Environment. CoRR abs/2403.10299 (2024) - 2023
- [j12]Shang Jiang, Mehdi Keyvan-Ekbatani, Dong Ngoduy:
Partitioning of urban networks with polycentric congestion pattern for traffic management policies: Identifying protected networks. Comput. Aided Civ. Infrastructure Eng. 38(4): 508-527 (2023) - [j11]Shang Jiang, Yingjun Wang, Jian Zhang, Jiewen Zheng:
Full-field deformation measurement of structural nodes based on panoramic camera and deep learning-based tracking method. Comput. Ind. 146: 103840 (2023) - [j10]Jianguo Jiang, Shang Jiang, Yi Liu, Siye Wang, Yanfang Zhang, Yue Feng, Ziwen Cao:
Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals. Comput. Networks 229: 109751 (2023) - [j9]Shang Jiang, Jian Zhang, Weiguo Wang, Yingjun Wang:
Automatic Inspection of Bridge Bolts Using Unmanned Aerial Vision and Adaptive Scale Unification-Based Deep Learning. Remote. Sens. 15(2): 328 (2023) - [c9]Fei Liang, Siye Wang, Ziwen Cao, Yue Feng, Shang Jiang, Yanfang Zhang:
BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability. ISCC 2023: 844-850 - 2022
- [j8]FuTao Ni, Zhili He, Shang Jiang, Weiguo Wang, Jian Zhang:
A Generative adversarial learning strategy for enhanced lightweight crack delineation networks. Adv. Eng. Informatics 52: 101575 (2022) - [j7]Shang Jiang, Yuan Wang:
Internal Mode Decoupled Harmonic Current Tracking for Vehicular PMSMs Noise Reduction. IEEE Trans. Veh. Technol. 71(12): 12711-12721 (2022) - [c8]Yue Feng, Weiqing Huang, Siye Wang, Yanfang Zhang, Shang Jiang, Ziwen Cao:
Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection. CollaborateCom (2) 2022: 75-90 - [c7]Ziwen Cao, Siye Wang, Degang Sun, Yanfang Zhang, Yue Feng, Shang Jiang:
ITAR: A Method for Indoor RFID Trajectory Automatic Recovery. CollaborateCom (2) 2022: 400-418 - [c6]Jiamin Chen, Mingchen Wang, Shang Jiang, Bin Huang, Hongbo Sun:
Learning Spatiotemporal Features for Video Semantic Segmentation Using 3D Convolutional Neural Networks. ISCSIC 2022: 55-62 - [c5]Ziwen Cao, Degang Sun, Siye Wang, Yanfang Zhang, Yue Feng, Shang Jiang:
R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering. WASA (2) 2022: 582-594 - 2021
- [j6]Yongding Tian, Cheng Zhang, Shang Jiang, Jian Zhang, Wenhui Duan:
Noncontact cable force estimation with unmanned aerial vehicle and computer vision. Comput. Aided Civ. Infrastructure Eng. 36(1): 73-88 (2021) - [j5]Yue Feng, Weiqing Huang, Siye Wang, Yanfang Zhang, Shang Jiang:
Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach. Comput. Networks 189: 107922 (2021) - [j4]Xu Han, Shang Jiang, Jia Yu, Feng Zhang:
A Visual Tracking Algorithm Based on Estimation of Regression Probability Distribution. Traitement du Signal 38(4): 1209-1215 (2021) - 2020
- [j3]Shang Jiang, Jian Zhang:
Real-time crack assessment using deep neural networks with wall-climbing unmanned aerial system. Comput. Aided Civ. Infrastructure Eng. 35(6): 549-564 (2020) - [c4]Jianguo Jiang, Shang Jiang, Bobai Zhao, Siye Wang, Mengnan Cai, Yanfang Zhang:
CS-Dict: Accurate Indoor Localization with CSI Selective Amplitude and Phase Based Regularized Dictionary Learning. ICA3PP (2) 2020: 677-689 - [c3]Shang Jiang, Wenxia Wei, Yanlin Wu, Rui Tang, Qingquan Feng, Daogang Ji:
War Chess as Hierarchical Learning Environment. ISCID 2020: 368-371 - [i1]Shang Jiang, Haoran Qin, Bingli Zhang, Jieyu Zheng:
Optimized Loss Functions for Object detection: A Case Study on Nighttime Vehicle Detection. CoRR abs/2011.05523 (2020)
2010 – 2019
- 2019
- [j2]Bobai Zhao, Dali Zhu, Tong Xi, Chenggang Jia, Shang Jiang, Siye Wang:
Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi. Comput. Networks 162 (2019) - 2018
- [c2]Yihang Cheng, Xi Zhang, Hao Wang, Shang Jiang:
How to Improve the Answering Effectiveness in Pay-for-Knowledge Community: An Exploratory Application of Intelligent QA System. WWW (Companion Volume) 2018: 313-317 - 2012
- [j1]Huanlin Liu, Shang Jiang, Chun-yan Chen:
A novel wavelength conversion scheme based on a single SOA inserted MZI for all-optical switching network. Photonic Netw. Commun. 23(2): 166-171 (2012) - 2011
- [c1]Xiaojun Lin, Shang Jiang, Xiangzhu Liu, Kuo Yang:
The CMM Measurement Path Planning for Blade Surface Based on the Contour Measurement. ICDMA 2011: 1228-1232
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint