iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/13/4012.rss
dblp: Wenjia Niu https://dblp.org/pid/13/4012.html dblp person page RSS feed Thu, 07 Nov 2024 21:30:08 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Wenjia Niuhttps://dblp.org/pid/13/4012.html14451 Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation.https://doi.org/10.1109/MNET.2024.3366232, , , , , , , , , :
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 ()]]>
https://dblp.org/rec/journals/network/WuXTYCTZLHN24Wed, 01 May 2024 01:00:00 +0200
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers.https://doi.org/10.1109/TR.2024.3367780, , , , , , , , :
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 ()]]>
https://dblp.org/rec/journals/tr/TianXTSCLBNL24Sun, 01 Sep 2024 01:00:00 +0200
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning.https://doi.org/10.1007/978-3-031-57919-6_3, , , , , , , , :
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning. Intelligent Information Processing (2) : 32-45]]>
https://dblp.org/rec/conf/iip/ChengWXCLTNWZ24Mon, 01 Jan 2024 00:00:00 +0100
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models.https://doi.org/10.1007/978-981-97-5498-4_17, , , , , , :
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. KSEM (3) : 220-232]]>
https://dblp.org/rec/conf/ksem/CuiWGLTLN24Mon, 01 Jan 2024 00:00:00 +0100
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.https://doi.org/10.1007/978-981-97-5498-4_26, , , , , , , , :
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. KSEM (3) : 336-348]]>
https://dblp.org/rec/conf/ksem/SongLTWLTNZL24Mon, 01 Jan 2024 00:00:00 +0100
OSS Malicious Package Analysis in the Wild.https://doi.org/10.48550/arXiv.2404.04991, , , , , :
OSS Malicious Package Analysis in the Wild. CoRR abs/2404.04991 ()]]>
https://dblp.org/rec/journals/corr/abs-2404-04991Mon, 01 Jan 2024 00:00:00 +0100
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems.https://doi.org/10.48550/arXiv.2404.11467, , , , , , , :
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems. CoRR abs/2404.11467 ()]]>
https://dblp.org/rec/journals/corr/abs-2404-11467Mon, 01 Jan 2024 00:00:00 +0100
Obfuscating IoT Device Scanning Activity via Adversarial Example Generation.https://doi.org/10.48550/arXiv.2406.11515, , , , , :
Obfuscating IoT Device Scanning Activity via Adversarial Example Generation. CoRR abs/2406.11515 ()]]>
https://dblp.org/rec/journals/corr/abs-2406-11515Mon, 01 Jan 2024 00:00:00 +0100
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.https://doi.org/10.48550/arXiv.2407.08532, , , , , , :
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 ()]]>
https://dblp.org/rec/journals/corr/abs-2407-08532Mon, 01 Jan 2024 00:00:00 +0100
Visual Prompting in LLMs for Enhancing Emotion Recognition.https://doi.org/10.48550/arXiv.2410.02244, , , , , , , :
Visual Prompting in LLMs for Enhancing Emotion Recognition. CoRR abs/2410.02244 ()]]>
https://dblp.org/rec/journals/corr/abs-2410-02244Mon, 01 Jan 2024 00:00:00 +0100
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning.https://doi.org/10.1109/TAI.2022.3190811, , , , , , , , :
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 ()]]>
https://dblp.org/rec/journals/tai/ChenLBWXLNTZ23Sun, 01 Oct 2023 01:00:00 +0200
Robust Reinforcement Learning via Progressive Task Sequence.https://doi.org/10.24963/ijcai.2023/51, , , , :
Robust Reinforcement Learning via Progressive Task Sequence. IJCAI : 455-463]]>
https://dblp.org/rec/conf/ijcai/LiTTNL23Sun, 01 Jan 2023 00:00:00 +0100
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.https://doi.org/10.1109/ISSREW60843.2023.00076, , , , , , , :
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. ISSREW : 214-221]]>
https://dblp.org/rec/conf/issre/TianLCTNLQZ23Sun, 01 Jan 2023 00:00:00 +0100
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration.https://doi.org/10.1007/978-981-97-2458-1_6, , , , , , , , , :
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration. ML4CS : 74-89]]>
https://dblp.org/rec/conf/ml4cs/LiuQWCHCCTNL23Sun, 01 Jan 2023 00:00:00 +0100
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.https://doi.org/10.1587/transinf.2021bcp0014, , , , , , , , :
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 ()]]>
https://dblp.org/rec/journals/ieicetd/XiangLCLTNLLW22Sat, 01 Jan 2022 00:00:00 +0100
Four-player GroupGAN for weak expression recognition via latent expression magnification.https://doi.org/10.1016/j.knosys.2022.109304, , , :
Four-player GroupGAN for weak expression recognition via latent expression magnification. Knowl. Based Syst. 251: 109304 ()]]>
https://dblp.org/rec/journals/kbs/NiuZLL22Sat, 01 Jan 2022 00:00:00 +0100
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.https://doi.org/10.1109/TGCN.2022.3162649, , , , , , , , , :
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 ()]]>
https://dblp.org/rec/journals/tgcn/LiNTCXWXTBL22Sat, 01 Jan 2022 00:00:00 +0100
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering.https://doi.org/10.1109/TSC.2021.3103769, , :
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 ()]]>
https://dblp.org/rec/journals/tsc/TongNL22Sat, 01 Jan 2022 00:00:00 +0100
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.https://doi.org/10.1109/ICPADS56603.2022.00036, , , , :
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness. ICPADS : 217-225]]>
https://dblp.org/rec/conf/icpads/ZhaiWLLN22Sat, 01 Jan 2022 00:00:00 +0100
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections.https://doi.org/10.1007/978-3-031-03948-5_42, , , , , , , , :
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing : 522-535]]>
https://dblp.org/rec/conf/iip/QiaoSCZWWTNL22Sat, 01 Jan 2022 00:00:00 +0100
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.https://doi.org/10.1002/int.22380, , , , , , , , , :
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 ()]]>
https://dblp.org/rec/journals/ijis/ChenLXNTWLCLC21Fri, 01 Jan 2021 00:00:00 +0100
Deep robust image deblurring via blur distilling and information comparison in latent space.https://doi.org/10.1016/j.neucom.2021.09.019, , , , :
Deep robust image deblurring via blur distilling and information comparison in latent space. Neurocomputing 466: 69-79 ()]]>
https://dblp.org/rec/journals/ijon/NiuZLZL21Fri, 01 Jan 2021 00:00:00 +0100
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.https://doi.org/10.1142/S0218126621502297, , , , :
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 ()]]>
https://dblp.org/rec/journals/jcsc/WangTLNT21Fri, 01 Jan 2021 00:00:00 +0100
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.https://doi.org/10.1007/s11390-021-1217-z, , , , , , , , :
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 ()]]>
https://dblp.org/rec/journals/jcst/ChenLLWNTCCL21Fri, 01 Jan 2021 00:00:00 +0100
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.https://doi.org/10.1155/2021/6631247, , , , , , , :
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 ()]]>
https://dblp.org/rec/journals/scn/TianLTNCCLW21Fri, 01 Jan 2021 00:00:00 +0100
Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring.https://doi.org/10.3390/sym13040630, , :
Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring. Symmetry 13(4): 630 ()]]>
https://dblp.org/rec/journals/symmetry/NiuXP21Fri, 01 Jan 2021 00:00:00 +0100
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.https://doi.org/10.1109/TGCN.2021.3069121, , , , , , :
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 ()]]>
https://dblp.org/rec/journals/tgcn/TongNTLBVL21Fri, 01 Jan 2021 00:00:00 +0100
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.https://doi.org/10.1109/TIP.2021.3101402, , , :
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding. IEEE Trans. Image Process. 30: 7101-7111 ()]]>
https://dblp.org/rec/journals/tip/NiuZLZ21Fri, 01 Jan 2021 00:00:00 +0100
Blockchain-based decentralized federated learning: A secure and privacy-preserving system.https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00150, , , , , , , , , :
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys : 941-948]]>
https://dblp.org/rec/conf/hpcc/ZhaoWSQZXTNLH21Fri, 01 Jan 2021 00:00:00 +0100
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.https://doi.org/10.1007/978-3-030-95384-3_41, , , , , , , :
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) : 660-675]]>
https://dblp.org/rec/conf/ica3pp/XieXLZTNLW21Fri, 01 Jan 2021 00:00:00 +0100
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.https://doi.org/10.1007/978-3-030-86890-1_21, , , , , , , , , :
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) : 368-383]]>
https://dblp.org/rec/conf/icics/WuSLTTNJHLL21Fri, 01 Jan 2021 00:00:00 +0100
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.https://doi.org/10.1109/SRDS53918.2021.00037, , , , , , , , :
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS : 299-309]]>
https://dblp.org/rec/conf/srds/ChenXLTTNLLC21Fri, 01 Jan 2021 00:00:00 +0100
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.https://arxiv.org/abs/2105.13077, , , , , :
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding. CoRR abs/2105.13077 ()]]>
https://dblp.org/rec/journals/corr/abs-2105-13077Fri, 01 Jan 2021 00:00:00 +0100
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.https://doi.org/10.1155/2020/8889122, , , , , , , :
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 ()]]>
https://dblp.org/rec/journals/scn/HuangTHTNLLC20Wed, 01 Jan 2020 00:00:00 +0100
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.https://doi.org/10.1155/2020/8823300, , , , , , , :
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 ()]]>
https://dblp.org/rec/journals/wicomm/LiXTNJLLH20Wed, 01 Jan 2020 00:00:00 +0100
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.https://doi.org/10.1007/978-3-030-71852-7_3, , , , , , , :
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt : 37-52]]>
https://dblp.org/rec/conf/cisc/JiaTZWLNTL20Wed, 01 Jan 2020 00:00:00 +0100
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.https://doi.org/10.1109/ICPADS51040.2020.00064, , , , , , , :
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS : 430-437]]>
https://dblp.org/rec/conf/icpads/TianWTNCCLL20Wed, 01 Jan 2020 00:00:00 +0100
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.https://doi.org/10.1109/ICPADS51040.2020.00094, , , , :
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS : 667-672]]>
https://dblp.org/rec/conf/icpads/WangXNTL20Wed, 01 Jan 2020 00:00:00 +0100
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.https://doi.org/10.1007/978-3-030-46931-3_24, , , , , , , :
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing : 254-265]]>
https://dblp.org/rec/conf/ifip12/GaoLLWXTNH20Wed, 01 Jan 2020 00:00:00 +0100
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00066, , , , , , , :
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom : 321-328]]>
https://dblp.org/rec/conf/ispa/WangXNTCLLL20Wed, 01 Jan 2020 00:00:00 +0100
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.https://doi.org/10.1007/978-981-15-9031-3_11, , , , , , , :
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec : 120-131]]>
https://dblp.org/rec/conf/socialsec/WangL0LNTLS20Wed, 01 Jan 2020 00:00:00 +0100
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.https://doi.org/10.1007/978-981-15-9031-3_30, , , , , , , :
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec : 340-354]]>
https://dblp.org/rec/conf/socialsec/HeLTN0ZL020Wed, 01 Jan 2020 00:00:00 +0100
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.https://doi.org/10.1007/978-3-030-65955-4_15, , , , :
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS : 207-221]]>
https://dblp.org/rec/conf/vecos/WangWTNL20Wed, 01 Jan 2020 00:00:00 +0100
Adversarial attack and defense in reinforcement learning-from AI security view.https://doi.org/10.1186/s42400-019-0027-x, , , , , :
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 ()]]>
https://dblp.org/rec/journals/cybersec/ChenLXNTH19Tue, 01 Jan 2019 00:00:00 +0100
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.http://arxiv.org/abs/1905.03454, , , , , , :
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack. CoRR abs/1905.03454 ()]]>
https://dblp.org/rec/journals/corr/abs-1905-03454Tue, 01 Jan 2019 00:00:00 +0100
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution.https://doi.org/10.1109/ACCESS.2018.2792427, , , , :
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution. IEEE Access 6: 5865-5878 ()]]>
https://dblp.org/rec/journals/access/GuoTTFN18Mon, 01 Jan 2018 00:00:00 +0100
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.https://doi.org/10.1109/DSC.2018.00125, , , , :
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC : 773-780]]>
https://dblp.org/rec/conf/dsc/XiangNLCH18Mon, 01 Jan 2018 00:00:00 +0100
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.https://doi.org/10.1109/DSC.2018.00126, , , , , :
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. DSC : 781-787]]>
https://dblp.org/rec/conf/dsc/BaiNLGXL18Mon, 01 Jan 2018 00:00:00 +0100
Intention-Aware Multi-channel Keyword Extension for Content Security.https://doi.org/10.1109/DSC.2018.00127, , , , :
Intention-Aware Multi-channel Keyword Extension for Content Security. DSC : 788-794]]>
https://dblp.org/rec/conf/dsc/QiuLXNC18Mon, 01 Jan 2018 00:00:00 +0100
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.https://doi.org/10.1109/DSC.2018.00129, , , , :
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. DSC : 803-810]]>
https://dblp.org/rec/conf/dsc/PangNLXW18Mon, 01 Jan 2018 00:00:00 +0100
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System.https://doi.org/10.1007/978-3-030-00828-4_22, , , , , , :
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing : 213-222]]>
https://dblp.org/rec/conf/ifip12/GaoNLCXBL18Mon, 01 Jan 2018 00:00:00 +0100
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.http://arxiv.org/abs/1807.06752, , , , , , :
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 ()]]>
https://dblp.org/rec/journals/corr/abs-1807-06752Mon, 01 Jan 2018 00:00:00 +0100
A Training-based Identification Approach to VIN Adversarial Examples.http://arxiv.org/abs/1810.08070, , , , , , :
A Training-based Identification Approach to VIN Adversarial Examples. CoRR abs/1810.08070 ()]]>
https://dblp.org/rec/journals/corr/abs-1810-08070Mon, 01 Jan 2018 00:00:00 +0100
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems.https://doi.org/10.1109/ACCESS.2017.2731360, , , , , , :
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems. IEEE Access 5: 15529-15541 ()]]>
https://dblp.org/rec/journals/access/GuoTNFWXT17Sun, 01 Jan 2017 00:00:00 +0100
Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.https://doi.org/10.1155/2017/3678487, , , :
Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation. Comput. Intell. Neurosci. 2017: 3678487:1-3678487:9 ()]]>
https://dblp.org/rec/journals/cin/NiuXZB17Sun, 01 Jan 2017 00:00:00 +0100
A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.https://doi.org/10.1155/2017/9290230, , , :
A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph. Comput. Intell. Neurosci. 2017: 9290230:1-9290230:11 ()]]>
https://dblp.org/rec/journals/cin/ZuXPN17Sun, 01 Jan 2017 00:00:00 +0100
New advances in securing cyberspace and curbing crowdturfing.https://doi.org/10.1002/cpe.4162, , , :
New advances in securing cyberspace and curbing crowdturfing. Concurr. Comput. Pract. Exp. 29(20) ()]]>
https://dblp.org/rec/journals/concurrency/LiNBL17Sun, 01 Jan 2017 00:00:00 +0100
Curbing collusive cyber-gossips for business brand management.https://doi.org/10.1080/17517575.2017.1309687, , , , :
Curbing collusive cyber-gossips for business brand management. Enterp. Inf. Syst. 11(10): 1457-1461 ()]]>
https://dblp.org/rec/journals/eis/LiNTBC17Sun, 01 Jan 2017 00:00:00 +0100
Request routing through collaborative in-network caching for bandwidth optimization: a methodology.https://doi.org/10.1002/ett.2947, , , , , :
Request routing through collaborative in-network caching for bandwidth optimization: a methodology. Trans. Emerg. Telecommun. Technol. 28(1) ()]]>
https://dblp.org/rec/journals/ett/XuWLCLN17Sun, 01 Jan 2017 00:00:00 +0100
Boosting imbalanced data learning with Wiener process oversampling.https://doi.org/10.1007/s11704-016-5250-y, , , , , , :
Boosting imbalanced data learning with Wiener process oversampling. Frontiers Comput. Sci. 11(5): 836-851 ()]]>
https://dblp.org/rec/journals/fcsc/LiLNCCTG17Sun, 01 Jan 2017 00:00:00 +0100
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.https://doi.org/10.1007/978-3-319-89500-0_33, , , , , , , :
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. ICICS : 374-384]]>
https://dblp.org/rec/conf/icics/LiuNLZCYXH17Sun, 01 Jan 2017 00:00:00 +0100
A Cross-Modal CCA-Based Astroturfing Detection Approach.https://doi.org/10.1007/978-3-319-89500-0_50, , , , , , :
A Cross-Modal CCA-Based Astroturfing Detection Approach. ICICS : 582-592]]>
https://dblp.org/rec/conf/icics/BaiXNLCLW17Sun, 01 Jan 2017 00:00:00 +0100
A Hidden Astroturfing Detection Approach Base on Emotion Analysis.https://doi.org/10.1007/978-3-319-63558-3_5, , , , , , , , :
A Hidden Astroturfing Detection Approach Base on Emotion Analysis. KSEM : 55-66]]>
https://dblp.org/rec/conf/ksem/ChenANWBLXWL17Sun, 01 Jan 2017 00:00:00 +0100
Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution.https://doi.org/10.1007/978-3-319-63558-3_30, , , , , :
Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution. KSEM : 359-370]]>
https://dblp.org/rec/conf/ksem/GuoTNFXT17Sun, 01 Jan 2017 00:00:00 +0100
Securing cyberspace.https://doi.org/10.1002/cpe.3753, , , , , :
Securing cyberspace. Concurr. Comput. Pract. Exp. 28(6): 1870-1871 ()]]>
https://dblp.org/rec/journals/concurrency/LiNGBLC16Fri, 01 Jan 2016 00:00:00 +0100
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.https://doi.org/10.1007/s10922-015-9361-9, , , , :
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks. J. Netw. Syst. Manag. 24(4): 834-858 ()]]>
https://dblp.org/rec/journals/jnsm/ZhangTHNL16Fri, 01 Jan 2016 00:00:00 +0100
A differentially private algorithm for location data release.https://doi.org/10.1007/s10115-015-0856-1, , , :
A differentially private algorithm for location data release. Knowl. Inf. Syst. 47(3): 647-669 ()]]>
https://dblp.org/rec/journals/kais/XiongZNL16Fri, 01 Jan 2016 00:00:00 +0100
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.https://doi.org/10.1007/s10115-015-0864-1, , , , , , :
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy. Knowl. Inf. Syst. 48(1): 111-141 ()]]>
https://dblp.org/rec/journals/kais/NiuTLLWTG16Fri, 01 Jan 2016 00:00:00 +0100
Riemannian optimization with subspace tracking for low-rank recovery.https://doi.org/10.1109/IJCNN.2016.7727618, , , , , :
Riemannian optimization with subspace tracking for low-rank recovery. IJCNN : 3280-3287]]>
https://dblp.org/rec/conf/ijcnn/LiNLTXG16Fri, 01 Jan 2016 00:00:00 +0100
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.https://doi.org/10.1007/s10922-014-9302-z, , , , , , :
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks. J. Netw. Syst. Manag. 23(3): 474-501 ()]]>
https://dblp.org/rec/journals/jnsm/LiNLTHLG15Thu, 01 Jan 2015 00:00:00 +0100
Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.https://doi.org/10.1145/2806416.2806532, , , , , :
Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization. CIKM : 801-809]]>
https://dblp.org/rec/conf/cikm/LiNLCTG15Thu, 01 Jan 2015 00:00:00 +0100
Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation.https://doi.org/10.1145/2806416.2806469, , , , , , :
Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation. CIKM : 1251-1260]]>
https://dblp.org/rec/conf/cikm/KangLHWNXP15Thu, 01 Jan 2015 00:00:00 +0100
Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.https://doi.org/10.1007/978-3-319-25159-2_53, , , :
Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches. KSEM : 588-599]]>
https://dblp.org/rec/conf/ksem/CaoCZN15Thu, 01 Jan 2015 00:00:00 +0100
Special issue on behavior data security issues in network information propagation.https://doi.org/10.1016/j.future.2014.02.005, , :
Special issue on behavior data security issues in network information propagation. Future Gener. Comput. Syst. 36: 120-121 ()]]>
https://dblp.org/rec/journals/fgcs/LiNB14Wed, 01 Jan 2014 00:00:00 +0100
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.https://doi.org/10.1016/j.jnca.2013.01.008, , , , , , :
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization. J. Netw. Comput. Appl. 37: 155-169 ()]]>
https://dblp.org/rec/journals/jnca/NiuLTYCSC14Wed, 01 Jan 2014 00:00:00 +0100
A novel cache size optimization scheme based on manifold learning in Content Centric Networking.https://doi.org/10.1016/j.jnca.2013.03.002, , , , , , :
A novel cache size optimization scheme based on manifold learning in Content Centric Networking. J. Netw. Comput. Appl. 37: 273-281 ()]]>
https://dblp.org/rec/journals/jnca/XuLLWNTC14Wed, 01 Jan 2014 00:00:00 +0100
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.https://doi.org/10.1016/j.jnca.2013.04.002, , , , , , :
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 39: 38-51 ()]]>
https://dblp.org/rec/journals/jnca/TongNLTCSC14Wed, 01 Jan 2014 00:00:00 +0100
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.https://doi.org/10.1016/j.jnca.2014.05.006, , , , , , , :
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network. J. Netw. Comput. Appl. 44: 120-133 ()]]>
https://dblp.org/rec/journals/jnca/NiuLTSLHVG14Wed, 01 Jan 2014 00:00:00 +0100
Context-Aware Service Ranking in Wireless Sensor Networks.https://doi.org/10.1007/s10922-012-9259-8, , , , , , :
Context-Aware Service Ranking in Wireless Sensor Networks. J. Netw. Syst. Manag. 22(1): 50-74 ()]]>
https://dblp.org/rec/journals/jnsm/NiuLTLCSC14Wed, 01 Jan 2014 00:00:00 +0100
Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.https://doi.org/10.1109/ICDM.2014.43, , , , , :
Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction. ICDM : 520-529]]>
https://dblp.org/rec/conf/icdm/QiaoZNZWG14Wed, 01 Jan 2014 00:00:00 +0100
A DBN-Based Classifying Approach to Discover the Internet Water Army.https://doi.org/10.1007/978-3-662-44980-6_9, , , :
A DBN-Based Classifying Approach to Discover the Internet Water Army. Intelligent Information Processing : 78-89]]>
https://dblp.org/rec/conf/ifip12/SunZNC14Wed, 01 Jan 2014 00:00:00 +0100
Privacy Preserving in Location Data Release: A Differential Privacy Approach.https://doi.org/10.1007/978-3-319-13560-1_15, , , , :
Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI : 183-195]]>
https://dblp.org/rec/conf/pricai/XiongZPNL14Wed, 01 Jan 2014 00:00:00 +0100
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.https://doi.org/10.1007/s10922-012-9237-1, , , , , :
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks. J. Netw. Syst. Manag. 21(3): 384-407 ()]]>
https://dblp.org/rec/journals/jnsm/XuNTLZC13Tue, 01 Jan 2013 00:00:00 +0100
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.https://doi.org/10.1007/978-3-319-04048-6_5, , , , , :
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks. BSI@PAKDD/BSIC@IJCAI : 44-55]]>
https://dblp.org/rec/conf/pakdd/QuNZWLW13Tue, 01 Jan 2013 00:00:00 +0100
An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.https://doi.org/10.1007/978-3-319-04048-6_18, , , , :
An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network. BSI@PAKDD/BSIC@IJCAI : 204-213]]>
https://dblp.org/rec/conf/pakdd/HouSNFQ13Tue, 01 Jan 2013 00:00:00 +0100
Guest Editorial.https://doi.org/10.4304/jnw.7.6.893-894, :
Guest Editorial. J. Networks 7(6): 893-894 ()]]>
https://dblp.org/rec/journals/jnw/NiuL12Sun, 01 Jan 2012 00:00:00 +0100
Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network.https://doi.org/10.1109/ICIS.2012.113, , , , , :
Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network. ACIS-ICIS : 99-104]]>
https://dblp.org/rec/conf/ACISicis/ZhaoNQCTL12Sun, 01 Jan 2012 00:00:00 +0100
An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.https://doi.org/10.1007/978-3-642-36288-0_6, , , , , :
An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance. ADMI : 51-64]]>
https://dblp.org/rec/conf/admi/NiuYLTTC12Sun, 01 Jan 2012 00:00:00 +0100
Aggregating user rating and service context for WSN service ranking.https://doi.org/10.1109/GLOCOM.2012.6503973, , , , :
Aggregating user rating and service context for WSN service ranking. GLOBECOM : 5362-5367]]>
https://dblp.org/rec/conf/globecom/LeiNQTC12Sun, 01 Jan 2012 00:00:00 +0100
A Reference Model for Virtual Resource Description and Discovery in Virtual Networks.https://doi.org/10.1007/978-3-642-31137-6_23, , , , , :
A Reference Model for Virtual Resource Description and Discovery in Virtual Networks. ICCSA (3) : 297-310]]>
https://dblp.org/rec/conf/iccsa/XuHNLLC12Sun, 01 Jan 2012 00:00:00 +0100
Frequency-Adaptive Cluster Head Election in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-32891-6_39, , , , :
Frequency-Adaptive Cluster Head Election in Wireless Sensor Network. Intelligent Information Processing : 311-319]]>
https://dblp.org/rec/conf/ifip12/YunNYTC12Sun, 01 Jan 2012 00:00:00 +0100
Hierarchical Workflow Management in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-32695-0_53, , , , , :
Hierarchical Workflow Management in Wireless Sensor Network. PRICAI : 601-612]]>
https://dblp.org/rec/conf/pricai/TongNLTTC12Sun, 01 Jan 2012 00:00:00 +0100
An approach for adaptive associative classification.https://doi.org/10.1016/j.eswa.2011.03.079, , , :
An approach for adaptive associative classification. Expert Syst. Appl. 38(9): 11873-11883 ()]]>
https://dblp.org/rec/journals/eswa/WangYNS11Sat, 01 Jan 2011 00:00:00 +0100
Tolerance granular computing towards incomplete information system.https://doi.org/10.1504/IJGCRSIS.2011.041457, , , :
Tolerance granular computing towards incomplete information system. Int. J. Granul. Comput. Rough Sets Intell. Syst. 2(1): 10-22 ()]]>
https://dblp.org/rec/journals/ijgcrsis/ShiNML11Sat, 01 Jan 2011 00:00:00 +0100
Multi-granularity context model for dynamic Web service composition.https://doi.org/10.1016/j.jnca.2010.07.014, , , , :
Multi-granularity context model for dynamic Web service composition. J. Netw. Comput. Appl. 34(1): 312-326 ()]]>
https://dblp.org/rec/journals/jnca/NiuLZTS11Sat, 01 Jan 2011 00:00:00 +0100
CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.https://doi.org/10.1016/j.jnca.2011.06.008, , , , :
CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition. J. Netw. Comput. Appl. 34(5): 1757-1770 ()]]>
https://dblp.org/rec/journals/jnca/NiuLTZS11Sat, 01 Jan 2011 00:00:00 +0100
Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.https://doi.org/10.1007/978-3-642-27609-5_14, , , , :
Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition. ADMI : 211-227]]>
https://dblp.org/rec/conf/admi/WangNLYS11Sat, 01 Jan 2011 00:00:00 +0100
Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.https://doi.org/10.1007/978-3-642-31875-7_38, , , , :
Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network. ICSOC Workshops : 270-282]]>
https://dblp.org/rec/conf/icsoc/TongNTLZ11Sat, 01 Jan 2011 00:00:00 +0100
Tolerance-Based Adaptive Online Outlier Detection for Internet of Things.https://doi.org/10.1109/GreenCom-CPSCom.2010.23, , , , :
Tolerance-Based Adaptive Online Outlier Detection for Internet of Things. GreenCom/CPSCom : 560-565]]>
https://dblp.org/rec/conf/greencom/ShenZNLT10Fri, 01 Jan 2010 00:00:00 +0100
Multi-agent and Workflow-Based Web Service Management Model.https://doi.org/10.1007/978-3-642-16327-2_7, , , , :
Multi-agent and Workflow-Based Web Service Management Model. Intelligent Information Processing : 26-34]]>
https://dblp.org/rec/conf/ifip12/NiuDHYS10Fri, 01 Jan 2010 00:00:00 +0100
Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services.https://doi.org/10.1109/WI-IAT.2010.51, , , , :
Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services. Web Intelligence : 589-596]]>
https://dblp.org/rec/conf/webi/HanSNCY10Fri, 01 Jan 2010 00:00:00 +0100
An Approach for Diagnosing Unexpected Faults in Web Service Flows.https://doi.org/10.1109/GCC.2009.25, , , , :
An Approach for Diagnosing Unexpected Faults in Web Service Flows. GCC : 61-66]]>
https://dblp.org/rec/conf/gcc/HanSNLZ09Thu, 01 Jan 2009 00:00:00 +0100
Facilitating dynamic web service composition with fine-granularity context management.https://doi.org/10.1109/GRC.2009.5255078, , , , :
Facilitating dynamic web service composition with fine-granularity context management. GrC : 454-459]]>
https://dblp.org/rec/conf/grc/NiuLYHS09Thu, 01 Jan 2009 00:00:00 +0100
Similarity Based Semantic Web Service Match.https://doi.org/10.1007/978-3-642-05250-7_27, , :
Similarity Based Semantic Web Service Match. WISM : 252-260]]>
https://dblp.org/rec/conf/wism/PengNH09Thu, 01 Jan 2009 00:00:00 +0100
Improving Grade Match to Value Match for Semantic Web Service Discovery.https://doi.org/10.1109/ICNC.2008.215, , , :
Improving Grade Match to Value Match for Semantic Web Service Discovery. ICNC (5) : 232-236]]>
https://dblp.org/rec/conf/icnc/PengSCN08Tue, 01 Jan 2008 00:00:00 +0100
A DDL-Based Model for Web Service Composition in Context-Aware Environment.https://doi.org/10.1109/ICWS.2008.34, , , , :
A DDL-Based Model for Web Service Composition in Context-Aware Environment. ICWS : 787-788]]>
https://dblp.org/rec/conf/icws/NiuSWCP08Tue, 01 Jan 2008 00:00:00 +0100
A Context Model for Service Composition Based on Dynamic Description Logic.https://doi.org/10.1007/978-0-387-87685-6_4, , :
A Context Model for Service Composition Based on Dynamic Description Logic. Intelligent Information Processing : 7-16]]>
https://dblp.org/rec/conf/ifip12/NiuSC08Tue, 01 Jan 2008 00:00:00 +0100
Semantic Filtering for DDL-Based Service Composition.https://doi.org/10.1007/978-3-540-89197-0_72, , , , :
Semantic Filtering for DDL-Based Service Composition. PRICAI : 778-787]]>
https://dblp.org/rec/conf/pricai/NiuSCPC08Tue, 01 Jan 2008 00:00:00 +0100