dblp: Wenjia Niu
https://dblp.org/pid/13/4012.html
dblp person page RSS feedThu, 07 Nov 2024 21:30:08 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Wenjia Niuhttps://dblp.org/pid/13/4012.html14451Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation.https://doi.org/10.1109/MNET.2024.3366232Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu: Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation.IEEE Netw.38(3): 63-69 (2024)]]>https://dblp.org/rec/journals/network/WuXTYCTZLHN24Wed, 01 May 2024 01:00:00 +0200Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers.https://doi.org/10.1109/TR.2024.3367780Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu: Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers.IEEE Trans. Reliab.73(3): 1529-1543 (2024)]]>https://dblp.org/rec/journals/tr/TianXTSCLBNL24Sun, 01 Sep 2024 01:00:00 +0200Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning.https://doi.org/10.1007/978-3-031-57919-6_3Dianjing Cheng, Xingyu Wu, Zhenghao Xie, Zhihua Cui, Qiong Li, Endong Tong, Wenjia Niu, Ziyi Wei, Xinyi Zhao: Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning.Intelligent Information Processing (2)2024: 32-45]]>https://dblp.org/rec/conf/iip/ChengWXCLTNWZ24Mon, 01 Jan 2024 00:00:00 +0100Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models.https://doi.org/10.1007/978-981-97-5498-4_17Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu: Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models.KSEM (3)2024: 220-232]]>https://dblp.org/rec/conf/ksem/CuiWGLTLN24Mon, 01 Jan 2024 00:00:00 +0100Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.https://doi.org/10.1007/978-981-97-5498-4_26Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu: Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.KSEM (3)2024: 336-348]]>https://dblp.org/rec/conf/ksem/SongLTWLTNZL24Mon, 01 Jan 2024 00:00:00 +0100OSS Malicious Package Analysis in the Wild.https://doi.org/10.48550/arXiv.2404.04991Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li: OSS Malicious Package Analysis in the Wild.CoRRabs/2404.04991 (2024)]]>https://dblp.org/rec/journals/corr/abs-2404-04991Mon, 01 Jan 2024 00:00:00 +0100A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems.https://doi.org/10.48550/arXiv.2404.11467Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li: A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems.CoRRabs/2404.11467 (2024)]]>https://dblp.org/rec/journals/corr/abs-2404-11467Mon, 01 Jan 2024 00:00:00 +0100Obfuscating IoT Device Scanning Activity via Adversarial Example Generation.https://doi.org/10.48550/arXiv.2406.11515Haocong Li, Yaxin Zhang, Long Cheng, Wenjia Niu, Haining Wang, Qiang Li: Obfuscating IoT Device Scanning Activity via Adversarial Example Generation.CoRRabs/2406.11515 (2024)]]>https://dblp.org/rec/journals/corr/abs-2406-11515Mon, 01 Jan 2024 00:00:00 +0100Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.https://doi.org/10.48550/arXiv.2407.08532Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li: Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.CoRRabs/2407.08532 (2024)]]>https://dblp.org/rec/journals/corr/abs-2407-08532Mon, 01 Jan 2024 00:00:00 +0100Visual Prompting in LLMs for Enhancing Emotion Recognition.https://doi.org/10.48550/arXiv.2410.02244Qixuan Zhang, Zhifeng Wang, Dylan Zhang, Wenjia Niu, Sabrina B. Caldwell, Tom Gedeon, Yang Liu, Zhenyue Qin: Visual Prompting in LLMs for Enhancing Emotion Recognition.CoRRabs/2410.02244 (2024)]]>https://dblp.org/rec/journals/corr/abs-2410-02244Mon, 01 Jan 2024 00:00:00 +0100A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning.https://doi.org/10.1109/TAI.2022.3190811Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya: A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning.IEEE Trans. Artif. Intell.4(5): 1089-1100 (2023)]]>https://dblp.org/rec/journals/tai/ChenLBWXLNTZ23Sun, 01 Oct 2023 01:00:00 +0200Robust Reinforcement Learning via Progressive Task Sequence.https://doi.org/10.24963/ijcai.2023/51Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu: Robust Reinforcement Learning via Progressive Task Sequence.IJCAI2023: 455-463]]>https://dblp.org/rec/conf/ijcai/LiTTNL23Sun, 01 Jan 2023 00:00:00 +0100Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.https://doi.org/10.1109/ISSREW60843.2023.00076Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng: Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.ISSREW2023: 214-221]]>https://dblp.org/rec/conf/issre/TianLCTNLQZ23Sun, 01 Jan 2023 00:00:00 +0100Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration.https://doi.org/10.1007/978-981-97-2458-1_6Pengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu: Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration.ML4CS2023: 74-89]]>https://dblp.org/rec/conf/ml4cs/LiuQWCHCCTNL23Sun, 01 Jan 2023 00:00:00 +0100Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.https://doi.org/10.1587/transinf.2021bcp0014Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang: Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.IEICE Trans. Inf. Syst.105-D(2): 280-288 (2022)]]>https://dblp.org/rec/journals/ieicetd/XiangLCLTNLLW22Sat, 01 Jan 2022 00:00:00 +0100Four-player GroupGAN for weak expression recognition via latent expression magnification.https://doi.org/10.1016/j.knosys.2022.109304Wenjia Niu, Kaihao Zhang, Dongxu Li, Wenhan Luo: Four-player GroupGAN for weak expression recognition via latent expression magnification.Knowl. Based Syst.251: 109304 (2022)]]>https://dblp.org/rec/journals/kbs/NiuZLL22Sat, 01 Jan 2022 00:00:00 +0100Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.https://doi.org/10.1109/TGCN.2022.3162649Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu: Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.IEEE Trans. Green Commun. Netw.6(3): 1448-1458 (2022)]]>https://dblp.org/rec/journals/tgcn/LiNTCXWXTBL22Sat, 01 Jan 2022 00:00:00 +0100A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering.https://doi.org/10.1109/TSC.2021.3103769Endong Tong, Wenjia Niu, Jiqiang Liu: A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering.IEEE Trans. Serv. Comput.15(6): 3115-3128 (2022)]]>https://dblp.org/rec/journals/tsc/TongNL22Sat, 01 Jan 2022 00:00:00 +0100Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.https://doi.org/10.1109/ICPADS56603.2022.00036Di Zhai, Jian Wang, Jiqiang Liu, Tianhao Liu, Wenjia Niu: Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.ICPADS2022: 217-225]]>https://dblp.org/rec/conf/icpads/ZhaiWLLN22Sat, 01 Jan 2022 00:00:00 +0100Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections.https://doi.org/10.1007/978-3-031-03948-5_42Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu: Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections.Intelligent Information Processing2022: 522-535]]>https://dblp.org/rec/conf/iip/QiaoSCZWWTNL22Sat, 01 Jan 2022 00:00:00 +0100Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.https://doi.org/10.1002/int.22380Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen: Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.Int. J. Intell. Syst.36(5): 2323-2346 (2021)]]>https://dblp.org/rec/journals/ijis/ChenLXNTWLCLC21Fri, 01 Jan 2021 00:00:00 +0100Deep robust image deblurring via blur distilling and information comparison in latent space.https://doi.org/10.1016/j.neucom.2021.09.019Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong, Hongdong Li: Deep robust image deblurring via blur distilling and information comparison in latent space.Neurocomputing466: 69-79 (2021)]]>https://dblp.org/rec/journals/ijon/NiuZLZL21Fri, 01 Jan 2021 00:00:00 +0100A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.https://doi.org/10.1142/S0218126621502297Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong: A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.J. Circuits Syst. Comput.30(13): 2150229:1-2150229:21 (2021)]]>https://dblp.org/rec/journals/jcsc/WangTLNT21Fri, 01 Jan 2021 00:00:00 +0100Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.https://doi.org/10.1007/s11390-021-1217-zTong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li: Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.J. Comput. Sci. Technol.36(5): 1002-1021 (2021)]]>https://dblp.org/rec/journals/jcst/ChenLLWNTCCL21Fri, 01 Jan 2021 00:00:00 +0100Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.https://doi.org/10.1155/2021/6631247Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang: Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.Secur. Commun. Networks2021: 6631247:1-6631247:13 (2021)]]>https://dblp.org/rec/journals/scn/TianLTNCCLW21Fri, 01 Jan 2021 00:00:00 +0100Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring.https://doi.org/10.3390/sym13040630Wenjia Niu, Kewen Xia, Yongke Pan: Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring.Symmetry13(4): 630 (2021)]]>https://dblp.org/rec/journals/symmetry/NiuXP21Fri, 01 Jan 2021 00:00:00 +0100A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.https://doi.org/10.1109/TGCN.2021.3069121Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu: A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.IEEE Trans. Green Commun. Netw.5(2): 645-657 (2021)]]>https://dblp.org/rec/journals/tgcn/TongNTLBVL21Fri, 01 Jan 2021 00:00:00 +0100Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.https://doi.org/10.1109/TIP.2021.3101402Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong: Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.IEEE Trans. Image Process.30: 7101-7111 (2021)]]>https://dblp.org/rec/journals/tip/NiuZLZ21Fri, 01 Jan 2021 00:00:00 +0100Blockchain-based decentralized federated learning: A secure and privacy-preserving system.https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00150Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han: Blockchain-based decentralized federated learning: A secure and privacy-preserving system.HPCC/DSS/SmartCity/DependSys2021: 941-948]]>https://dblp.org/rec/conf/hpcc/ZhaoWSQZXTNLH21Fri, 01 Jan 2021 00:00:00 +0100Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.https://doi.org/10.1007/978-3-030-95384-3_41Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang: Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.ICA3PP (1)2021: 660-675]]>https://dblp.org/rec/conf/ica3pp/XieXLZTNLW21Fri, 01 Jan 2021 00:00:00 +0100Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.https://doi.org/10.1007/978-3-030-86890-1_21Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu: Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.ICICS (1)2021: 368-383]]>https://dblp.org/rec/conf/icics/WuSLTTNJHLL21Fri, 01 Jan 2021 00:00:00 +0100Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.https://doi.org/10.1109/SRDS53918.2021.00037Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen: Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.SRDS2021: 299-309]]>https://dblp.org/rec/conf/srds/ChenXLTTNLLC21Fri, 01 Jan 2021 00:00:00 +0100Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.https://arxiv.org/abs/2105.13077Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong, Xin Yu, Hongdong Li: Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.CoRRabs/2105.13077 (2021)]]>https://dblp.org/rec/journals/corr/abs-2105-13077Fri, 01 Jan 2021 00:00:00 +0100Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.https://doi.org/10.1155/2020/8889122Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang: Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.Secur. Commun. Networks2020: 8889122:1-8889122:15 (2020)]]>https://dblp.org/rec/journals/scn/HuangTHTNLLC20Wed, 01 Jan 2020 00:00:00 +0100An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.https://doi.org/10.1155/2020/8823300Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han: An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.Wirel. Commun. Mob. Comput.2020: 8823300:1-8823300:14 (2020)]]>https://dblp.org/rec/journals/wicomm/LiXTNJLLH20Wed, 01 Jan 2020 00:00:00 +0100Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.https://doi.org/10.1007/978-3-030-71852-7_3Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu: Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.Inscrypt2020: 37-52]]>https://dblp.org/rec/conf/cisc/JiaTZWLNTL20Wed, 01 Jan 2020 00:00:00 +0100Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.https://doi.org/10.1109/ICPADS51040.2020.00064Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu: Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.ICPADS2020: 430-437]]>https://dblp.org/rec/conf/icpads/TianWTNCCLL20Wed, 01 Jan 2020 00:00:00 +0100Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.https://doi.org/10.1109/ICPADS51040.2020.00094Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu: Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.ICPADS2020: 667-672]]>https://dblp.org/rec/conf/icpads/WangXNTL20Wed, 01 Jan 2020 00:00:00 +0100Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.https://doi.org/10.1007/978-3-030-46931-3_24Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han: Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.Intelligent Information Processing2020: 254-265]]>https://dblp.org/rec/conf/ifip12/GaoLLWXTNH20Wed, 01 Jan 2020 00:00:00 +0100Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00066Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li: Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.ISPA/BDCloud/SocialCom/SustainCom2020: 321-328]]>https://dblp.org/rec/conf/ispa/WangXNTCLLL20Wed, 01 Jan 2020 00:00:00 +0100A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.https://doi.org/10.1007/978-981-15-9031-3_11Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song: A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.SocialSec2020: 120-131]]>https://dblp.org/rec/conf/socialsec/WangL0LNTLS20Wed, 01 Jan 2020 00:00:00 +0100Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.https://doi.org/10.1007/978-981-15-9031-3_30Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang: Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.SocialSec2020: 340-354]]>https://dblp.org/rec/conf/socialsec/HeLTN0ZL020Wed, 01 Jan 2020 00:00:00 +0100A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.https://doi.org/10.1007/978-3-030-65955-4_15Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu: A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.VECoS2020: 207-221]]>https://dblp.org/rec/conf/vecos/WangWTNL20Wed, 01 Jan 2020 00:00:00 +0100Adversarial attack and defense in reinforcement learning-from AI security view.https://doi.org/10.1186/s42400-019-0027-xTong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han: Adversarial attack and defense in reinforcement learning-from AI security view.Cybersecur.2(1): 11 (2019)]]>https://dblp.org/rec/journals/cybersec/ChenLXNTH19Tue, 01 Jan 2019 00:00:00 +0100Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.http://arxiv.org/abs/1905.03454Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li: Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.CoRRabs/1905.03454 (2019)]]>https://dblp.org/rec/journals/corr/abs-1905-03454Tue, 01 Jan 2019 00:00:00 +0100A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution.https://doi.org/10.1109/ACCESS.2018.2792427Zhiwei Guo, Chaowei Tang, Hui Tang, Yunqing Fu, Wenjia Niu: A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution.IEEE Access6: 5865-5878 (2018)]]>https://dblp.org/rec/journals/access/GuoTTFN18Mon, 01 Jan 2018 00:00:00 +0100A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.https://doi.org/10.1109/DSC.2018.00125Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han: A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.DSC2018: 773-780]]>https://dblp.org/rec/conf/dsc/XiangNLCH18Mon, 01 Jan 2018 00:00:00 +0100Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.https://doi.org/10.1109/DSC.2018.00126XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu: Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.DSC2018: 781-787]]>https://dblp.org/rec/conf/dsc/BaiNLGXL18Mon, 01 Jan 2018 00:00:00 +0100Intention-Aware Multi-channel Keyword Extension for Content Security.https://doi.org/10.1109/DSC.2018.00127Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen: Intention-Aware Multi-channel Keyword Extension for Content Security.DSC2018: 788-794]]>https://dblp.org/rec/conf/dsc/QiuLXNC18Mon, 01 Jan 2018 00:00:00 +0100An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.https://doi.org/10.1109/DSC.2018.00129Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang: An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.DSC2018: 803-810]]>https://dblp.org/rec/conf/dsc/PangNLXW18Mon, 01 Jan 2018 00:00:00 +0100A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System.https://doi.org/10.1007/978-3-030-00828-4_22Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu: A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System.Intelligent Information Processing2018: 213-222]]>https://dblp.org/rec/conf/ifip12/GaoNLCXBL18Mon, 01 Jan 2018 00:00:00 +0100Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.http://arxiv.org/abs/1807.06752Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li: Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.CoRRabs/1807.06752 (2018)]]>https://dblp.org/rec/journals/corr/abs-1807-06752Mon, 01 Jan 2018 00:00:00 +0100A Training-based Identification Approach to VIN Adversarial Examples.http://arxiv.org/abs/1810.08070Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu: A Training-based Identification Approach to VIN Adversarial Examples.CoRRabs/1810.08070 (2018)]]>https://dblp.org/rec/journals/corr/abs-1810-08070Mon, 01 Jan 2018 00:00:00 +0100Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems.https://doi.org/10.1109/ACCESS.2017.2731360Zhiwei Guo, Chaowei Tang, Wenjia Niu, Yunqing Fu, Tong Wu, Haiyang Xia, Hui Tang: Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems.IEEE Access5: 15529-15541 (2017)]]>https://dblp.org/rec/journals/access/GuoTNFWXT17Sun, 01 Jan 2017 00:00:00 +0100Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.https://doi.org/10.1155/2017/3678487Wenjia Niu, Kewen Xia, Baokai Zu, Jianchuan Bai: Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.Comput. Intell. Neurosci.2017: 3678487:1-3678487:9 (2017)]]>https://dblp.org/rec/journals/cin/NiuXZB17Sun, 01 Jan 2017 00:00:00 +0100A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.https://doi.org/10.1155/2017/9290230Baokai Zu, Kewen Xia, Yongke Pan, Wenjia Niu: A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.Comput. Intell. Neurosci.2017: 9290230:1-9290230:11 (2017)]]>https://dblp.org/rec/journals/cin/ZuXPN17Sun, 01 Jan 2017 00:00:00 +0100New advances in securing cyberspace and curbing crowdturfing.https://doi.org/10.1002/cpe.4162Gang Li, Wenjia Niu, Lynn Batten, Jiqiang Liu: New advances in securing cyberspace and curbing crowdturfing.Concurr. Comput. Pract. Exp.29(20) (2017)]]>https://dblp.org/rec/journals/concurrency/LiNBL17Sun, 01 Jan 2017 00:00:00 +0100Curbing collusive cyber-gossips for business brand management.https://doi.org/10.1080/17517575.2017.1309687Gang Li, Wenjia Niu, Jianlong Tan, Lynn Batten, Liang Chang: Curbing collusive cyber-gossips for business brand management.Enterp. Inf. Syst.11(10): 1457-1461 (2017)]]>https://dblp.org/rec/journals/eis/LiNTBC17Sun, 01 Jan 2017 00:00:00 +0100Request routing through collaborative in-network caching for bandwidth optimization: a methodology.https://doi.org/10.1002/ett.2947Yuemei Xu, Zihou Wang, Yang Li, Fu Chen, Tao Lin, Wenjia Niu: Request routing through collaborative in-network caching for bandwidth optimization: a methodology.Trans. Emerg. Telecommun. Technol.28(1) (2017)]]>https://dblp.org/rec/journals/ett/XuWLCLN17Sun, 01 Jan 2017 00:00:00 +0100Boosting imbalanced data learning with Wiener process oversampling.https://doi.org/10.1007/s11704-016-5250-yQian Li, Gang Li, Wenjia Niu, Yanan Cao, Liang Chang, Jianlong Tan, Li Guo: Boosting imbalanced data learning with Wiener process oversampling.Frontiers Comput. Sci.11(5): 836-851 (2017)]]>https://dblp.org/rec/journals/fcsc/LiLNCCTG17Sun, 01 Jan 2017 00:00:00 +0100A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.https://doi.org/10.1007/978-3-319-89500-0_33Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han: A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.ICICS2017: 374-384]]>https://dblp.org/rec/conf/icics/LiuNLZCYXH17Sun, 01 Jan 2017 00:00:00 +0100A Cross-Modal CCA-Based Astroturfing Detection Approach.https://doi.org/10.1007/978-3-319-89500-0_50XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu: A Cross-Modal CCA-Based Astroturfing Detection Approach.ICICS2017: 582-592]]>https://dblp.org/rec/conf/icics/BaiXNLCLW17Sun, 01 Jan 2017 00:00:00 +0100A Hidden Astroturfing Detection Approach Base on Emotion Analysis.https://doi.org/10.1007/978-3-319-63558-3_5Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, XiaoXuan Bai, Jingjing Liu, Yingxiao Xiang, Tong Wu, Jiqiang Liu: A Hidden Astroturfing Detection Approach Base on Emotion Analysis.KSEM2017: 55-66]]>https://dblp.org/rec/conf/ksem/ChenANWBLXWL17Sun, 01 Jan 2017 00:00:00 +0100Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution.https://doi.org/10.1007/978-3-319-63558-3_30Zhiwei Guo, Chaowei Tang, Wenjia Niu, Yunqing Fu, Haiyang Xia, Hui Tang: Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution.KSEM2017: 359-370]]>https://dblp.org/rec/conf/ksem/GuoTNFXT17Sun, 01 Jan 2017 00:00:00 +0100Securing cyberspace.https://doi.org/10.1002/cpe.3753Gang Li, Wenjia Niu, Li Guo, Lynn Margaret Batten, Yinlong Liu, Guoyong Cai: Securing cyberspace.Concurr. Comput. Pract. Exp.28(6): 1870-1871 (2016)]]>https://dblp.org/rec/journals/concurrency/LiNGBLC16Fri, 01 Jan 2016 00:00:00 +0100Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.https://doi.org/10.1007/s10922-015-9361-9Bo Zhang, Endong Tong, Jie Hao, Wenjia Niu, Gang Li: Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.J. Netw. Syst. Manag.24(4): 834-858 (2016)]]>https://dblp.org/rec/journals/jnsm/ZhangTHNL16Fri, 01 Jan 2016 00:00:00 +0100A differentially private algorithm for location data release.https://doi.org/10.1007/s10115-015-0856-1Ping Xiong, Tianqing Zhu, Wenjia Niu, Gang Li: A differentially private algorithm for location data release.Knowl. Inf. Syst.47(3): 647-669 (2016)]]>https://dblp.org/rec/journals/kais/XiongZNL16Fri, 01 Jan 2016 00:00:00 +0100Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.https://doi.org/10.1007/s10115-015-0864-1Wenjia Niu, Endong Tong, Qian Li, Gang Li, Xuemin Wen, Jianlong Tan, Li Guo: Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.Knowl. Inf. Syst.48(1): 111-141 (2016)]]>https://dblp.org/rec/journals/kais/NiuTLLWTG16Fri, 01 Jan 2016 00:00:00 +0100Riemannian optimization with subspace tracking for low-rank recovery.https://doi.org/10.1109/IJCNN.2016.7727618Qian Li, Wenjia Niu, Gang Li, Jianlong Tan, Gang Xiong, Li Guo: Riemannian optimization with subspace tracking for low-rank recovery.IJCNN2016: 3280-3287]]>https://dblp.org/rec/conf/ijcnn/LiNLTXG16Fri, 01 Jan 2016 00:00:00 +0100Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.https://doi.org/10.1007/s10922-014-9302-zQian Li, Wenjia Niu, Gang Li, Endong Tong, Yue Hu, Ping Liu, Li Guo: Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.J. Netw. Syst. Manag.23(3): 474-501 (2015)]]>https://dblp.org/rec/journals/jnsm/LiNLTHLG15Thu, 01 Jan 2015 00:00:00 +0100Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.https://doi.org/10.1145/2806416.2806532Qian Li, Wenjia Niu, Gang Li, Yanan Cao, Jianlong Tan, Li Guo: Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.CIKM2015: 801-809]]>https://dblp.org/rec/conf/cikm/LiNLCTG15Thu, 01 Jan 2015 00:00:00 +0100Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation.https://doi.org/10.1145/2806416.2806469Cuicui Kang, Shengcai Liao, Yonghao He, Jian Wang, Wenjia Niu, Shiming Xiang, Chunhong Pan: Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation.CIKM2015: 1251-1260]]>https://dblp.org/rec/conf/cikm/KangLHWNXP15Thu, 01 Jan 2015 00:00:00 +0100Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.https://doi.org/10.1007/978-3-319-25159-2_53Yanan Cao, Cungen Cao, Jingzun Zhang, Wenjia Niu: Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.KSEM2015: 588-599]]>https://dblp.org/rec/conf/ksem/CaoCZN15Thu, 01 Jan 2015 00:00:00 +0100Special issue on behavior data security issues in network information propagation.https://doi.org/10.1016/j.future.2014.02.005Gang Li, Wenjia Niu, Lynn Margaret Batten: Special issue on behavior data security issues in network information propagation.Future Gener. Comput. Syst.36: 120-121 (2014)]]>https://dblp.org/rec/journals/fgcs/LiNB14Wed, 01 Jan 2014 00:00:00 +0100Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.https://doi.org/10.1016/j.jnca.2013.01.008Wenjia Niu, Gang Li, Endong Tong, Xinghua Yang, Liang Chang, Zhongzhi Shi, Song Ci: Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.J. Netw. Comput. Appl.37: 155-169 (2014)]]>https://dblp.org/rec/journals/jnca/NiuLTYCSC14Wed, 01 Jan 2014 00:00:00 +0100A novel cache size optimization scheme based on manifold learning in Content Centric Networking.https://doi.org/10.1016/j.jnca.2013.03.002Yuemei Xu, Yang Li, Tao Lin, Zihou Wang, Wenjia Niu, Hui Tang, Song Ci: A novel cache size optimization scheme based on manifold learning in Content Centric Networking.J. Netw. Comput. Appl.37: 273-281 (2014)]]>https://dblp.org/rec/journals/jnca/XuLLWNTC14Wed, 01 Jan 2014 00:00:00 +0100Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.https://doi.org/10.1016/j.jnca.2013.04.002Endong Tong, Wenjia Niu, Gang Li, Ding Tang, Liang Chang, Zhongzhi Shi, Song Ci: Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.J. Netw. Comput. Appl.39: 38-51 (2014)]]>https://dblp.org/rec/journals/jnca/TongNLTCSC14Wed, 01 Jan 2014 00:00:00 +0100A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.https://doi.org/10.1016/j.jnca.2014.05.006Wenjia Niu, Gang Li, Endong Tong, Quan Z. Sheng, Qian Li, Yue Hu, Athanasios V. Vasilakos, Li Guo: A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.J. Netw. Comput. Appl.44: 120-133 (2014)]]>https://dblp.org/rec/journals/jnca/NiuLTSLHVG14Wed, 01 Jan 2014 00:00:00 +0100Context-Aware Service Ranking in Wireless Sensor Networks.https://doi.org/10.1007/s10922-012-9259-8Wenjia Niu, Jun Lei, Endong Tong, Gang Li, Liang Chang, Zhongzhi Shi, Song Ci: Context-Aware Service Ranking in Wireless Sensor Networks.J. Netw. Syst. Manag.22(1): 50-74 (2014)]]>https://dblp.org/rec/journals/jnsm/NiuLTLCSC14Wed, 01 Jan 2014 00:00:00 +0100Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.https://doi.org/10.1109/ICDM.2014.43Zhi Qiao, Peng Zhang, Wenjia Niu, Chuan Zhou, Peng Wang, Li Guo: Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.ICDM2014: 520-529]]>https://dblp.org/rec/conf/icdm/QiaoZNZWG14Wed, 01 Jan 2014 00:00:00 +0100A DBN-Based Classifying Approach to Discover the Internet Water Army.https://doi.org/10.1007/978-3-662-44980-6_9Weiqiang Sun, Weizhong Zhao, Wenjia Niu, Liang Chang: A DBN-Based Classifying Approach to Discover the Internet Water Army.Intelligent Information Processing2014: 78-89]]>https://dblp.org/rec/conf/ifip12/SunZNC14Wed, 01 Jan 2014 00:00:00 +0100Privacy Preserving in Location Data Release: A Differential Privacy Approach.https://doi.org/10.1007/978-3-319-13560-1_15Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li: Privacy Preserving in Location Data Release: A Differential Privacy Approach.PRICAI2014: 183-195]]>https://dblp.org/rec/conf/pricai/XiongZPNL14Wed, 01 Jan 2014 00:00:00 +0100A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.https://doi.org/10.1007/s10922-012-9237-1Yuemei Xu, Wenjia Niu, Hui Tang, Gang Li, Zhijun Zhao, Song Ci: A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.J. Netw. Syst. Manag.21(3): 384-407 (2013)]]>https://dblp.org/rec/journals/jnsm/XuNTLZC13Tue, 01 Jan 2013 00:00:00 +0100Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.https://doi.org/10.1007/978-3-319-04048-6_5Benke Qu, Wenjia Niu, Tianqing Zhu, Lei Wu, Shijun Liu, Na Wang: Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.BSI@PAKDD/BSIC@IJCAI2013: 44-55]]>https://dblp.org/rec/conf/pakdd/QuNZWLW13Tue, 01 Jan 2013 00:00:00 +0100An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.https://doi.org/10.1007/978-3-319-04048-6_18Xiancheng Hou, Bing Shi, Wenjia Niu, Qi Feng, Ying Qi: An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.BSI@PAKDD/BSIC@IJCAI2013: 204-213]]>https://dblp.org/rec/conf/pakdd/HouSNFQ13Tue, 01 Jan 2013 00:00:00 +0100Guest Editorial.https://doi.org/10.4304/jnw.7.6.893-894Wenjia Niu, Gang Li: Guest Editorial.J. Networks7(6): 893-894 (2012)]]>https://dblp.org/rec/journals/jnw/NiuL12Sun, 01 Jan 2012 00:00:00 +0100Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network.https://doi.org/10.1109/ICIS.2012.113Hui Zhao, Wenjia Niu, Yifang Qin, Song Ci, Hui Tang, Tao Lin: Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network.ACIS-ICIS2012: 99-104]]>https://dblp.org/rec/conf/ACISicis/ZhaoNQCTL12Sun, 01 Jan 2012 00:00:00 +0100An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.https://doi.org/10.1007/978-3-642-36288-0_6Wenjia Niu, Xinghua Yang, Gang Li, Endong Tong, Hui Tang, Song Ci: An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.ADMI2012: 51-64]]>https://dblp.org/rec/conf/admi/NiuYLTTC12Sun, 01 Jan 2012 00:00:00 +0100Aggregating user rating and service context for WSN service ranking.https://doi.org/10.1109/GLOCOM.2012.6503973Jun Lei, Wenjia Niu, Yifang Qin, Hui Tang, Song Ci: Aggregating user rating and service context for WSN service ranking.GLOBECOM2012: 5362-5367]]>https://dblp.org/rec/conf/globecom/LeiNQTC12Sun, 01 Jan 2012 00:00:00 +0100A Reference Model for Virtual Resource Description and Discovery in Virtual Networks.https://doi.org/10.1007/978-3-642-31137-6_23Yuemei Xu, Yanni Han, Wenjia Niu, Yang Li, Tao Lin, Song Ci: A Reference Model for Virtual Resource Description and Discovery in Virtual Networks.ICCSA (3)2012: 297-310]]>https://dblp.org/rec/conf/iccsa/XuHNLLC12Sun, 01 Jan 2012 00:00:00 +0100Frequency-Adaptive Cluster Head Election in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-32891-6_39Tianlong Yun, Wenjia Niu, Xinghua Yang, Hui Tang, Song Ci: Frequency-Adaptive Cluster Head Election in Wireless Sensor Network.Intelligent Information Processing2012: 311-319]]>https://dblp.org/rec/conf/ifip12/YunNYTC12Sun, 01 Jan 2012 00:00:00 +0100Hierarchical Workflow Management in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-32695-0_53Endong Tong, Wenjia Niu, Gang Li, Hui Tang, Ding Tang, Song Ci: Hierarchical Workflow Management in Wireless Sensor Network.PRICAI2012: 601-612]]>https://dblp.org/rec/conf/pricai/TongNLTTC12Sun, 01 Jan 2012 00:00:00 +0100An approach for adaptive associative classification.https://doi.org/10.1016/j.eswa.2011.03.079Xiaofeng Wang, Kun Yue, Wenjia Niu, Zhongzhi Shi: An approach for adaptive associative classification.Expert Syst. Appl.38(9): 11873-11883 (2011)]]>https://dblp.org/rec/journals/eswa/WangYNS11Sat, 01 Jan 2011 00:00:00 +0100Tolerance granular computing towards incomplete information system.https://doi.org/10.1504/IJGCRSIS.2011.041457Zhongzhi Shi, Wenjia Niu, Zuqiang Meng, Yuan Lu: Tolerance granular computing towards incomplete information system.Int. J. Granul. Comput. Rough Sets Intell. Syst.2(1): 10-22 (2011)]]>https://dblp.org/rec/journals/ijgcrsis/ShiNML11Sat, 01 Jan 2011 00:00:00 +0100Multi-granularity context model for dynamic Web service composition.https://doi.org/10.1016/j.jnca.2010.07.014Wenjia Niu, Gang Li, Zhijun Zhao, Hui Tang, Zhongzhi Shi: Multi-granularity context model for dynamic Web service composition.J. Netw. Comput. Appl.34(1): 312-326 (2011)]]>https://dblp.org/rec/journals/jnca/NiuLZTS11Sat, 01 Jan 2011 00:00:00 +0100CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.https://doi.org/10.1016/j.jnca.2011.06.008Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi: CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.J. Netw. Comput. Appl.34(5): 1757-1770 (2011)]]>https://dblp.org/rec/journals/jnca/NiuLTZS11Sat, 01 Jan 2011 00:00:00 +0100Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.https://doi.org/10.1007/978-3-642-27609-5_14Xiaofeng Wang, Wenjia Niu, Gang Li, Xinghua Yang, Zhongzhi Shi: Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.ADMI2011: 211-227]]>https://dblp.org/rec/conf/admi/WangNLYS11Sat, 01 Jan 2011 00:00:00 +0100Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-31875-7_38Endong Tong, Wenjia Niu, Hui Tang, Gang Li, Zhijun Zhao: Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.ICSOC Workshops2011: 270-282]]>https://dblp.org/rec/conf/icsoc/TongNTLZ11Sat, 01 Jan 2011 00:00:00 +0100Tolerance-Based Adaptive Online Outlier Detection for Internet of Things.https://doi.org/10.1109/GreenCom-CPSCom.2010.23Qiang Shen, Zhijun Zhao, Wenjia Niu, Yu Liu, Hui Tang: Tolerance-Based Adaptive Online Outlier Detection for Internet of Things.GreenCom/CPSCom2010: 560-565]]>https://dblp.org/rec/conf/greencom/ShenZNLT10Fri, 01 Jan 2010 00:00:00 +0100Multi-agent and Workflow-Based Web Service Management Model.https://doi.org/10.1007/978-3-642-16327-2_7Wenjia Niu, Quansheng Dou, Xu Han, Xinghua Yang, Zhongzhi Shi: Multi-agent and Workflow-Based Web Service Management Model.Intelligent Information Processing2010: 26-34]]>https://dblp.org/rec/conf/ifip12/NiuDHYS10Fri, 01 Jan 2010 00:00:00 +0100Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services.https://doi.org/10.1109/WI-IAT.2010.51Xu Han, Zhongzhi Shi, Wenjia Niu, Kunrong Chen, Xinghua Yang: Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services.Web Intelligence2010: 589-596]]>https://dblp.org/rec/conf/webi/HanSNCY10Fri, 01 Jan 2010 00:00:00 +0100An Approach for Diagnosing Unexpected Faults in Web Service Flows.https://doi.org/10.1109/GCC.2009.25Xu Han, Zhongzhi Shi, Wenjia Niu, Fen Lin, Donglei Zhang: An Approach for Diagnosing Unexpected Faults in Web Service Flows.GCC2009: 61-66]]>https://dblp.org/rec/conf/gcc/HanSNLZ09Thu, 01 Jan 2009 00:00:00 +0100Facilitating dynamic web service composition with fine-granularity context management.https://doi.org/10.1109/GRC.2009.5255078Wenjia Niu, Gang Li, Xinghua Yang, Xu Han, Zhongzhi Shi: Facilitating dynamic web service composition with fine-granularity context management.GrC2009: 454-459]]>https://dblp.org/rec/conf/grc/NiuLYHS09Thu, 01 Jan 2009 00:00:00 +0100Similarity Based Semantic Web Service Match.https://doi.org/10.1007/978-3-642-05250-7_27Hui Peng, Wenjia Niu, Ronghuai Huang: Similarity Based Semantic Web Service Match.WISM2009: 252-260]]>https://dblp.org/rec/conf/wism/PengNH09Thu, 01 Jan 2009 00:00:00 +0100Improving Grade Match to Value Match for Semantic Web Service Discovery.https://doi.org/10.1109/ICNC.2008.215Hui Peng, Zhongzhi Shi, Liang Chang, Wenjia Niu: Improving Grade Match to Value Match for Semantic Web Service Discovery.ICNC (5)2008: 232-236]]>https://dblp.org/rec/conf/icnc/PengSCN08Tue, 01 Jan 2008 00:00:00 +0100A DDL-Based Model for Web Service Composition in Context-Aware Environment.https://doi.org/10.1109/ICWS.2008.34Wenjia Niu, Zhongzhi Shi, Changlin Wan, Liang Chang, Hui Peng: A DDL-Based Model for Web Service Composition in Context-Aware Environment.ICWS2008: 787-788]]>https://dblp.org/rec/conf/icws/NiuSWCP08Tue, 01 Jan 2008 00:00:00 +0100A Context Model for Service Composition Based on Dynamic Description Logic.https://doi.org/10.1007/978-0-387-87685-6_4Wenjia Niu, Zhongzhi Shi, Liang Chang: A Context Model for Service Composition Based on Dynamic Description Logic.Intelligent Information Processing2008: 7-16]]>https://dblp.org/rec/conf/ifip12/NiuSC08Tue, 01 Jan 2008 00:00:00 +0100Semantic Filtering for DDL-Based Service Composition.https://doi.org/10.1007/978-3-540-89197-0_72Wenjia Niu, Zhongzhi Shi, Peng Cao, Hui Peng, Liang Chang: Semantic Filtering for DDL-Based Service Composition.PRICAI2008: 778-787]]>https://dblp.org/rec/conf/pricai/NiuSCPC08Tue, 01 Jan 2008 00:00:00 +0100