45 results on '"Niu, Wenjia"'
Search Results
2. Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections
3. Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
4. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
5. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
6. A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning
7. Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions
8. A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection
9. Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control
10. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN
11. A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System
12. A Cross-Modal CCA-Based Astroturfing Detection Approach
13. A Hidden Astroturfing Detection Approach Base on Emotion Analysis
14. Beyond the Aggregation of Its Members—A Novel Group Recommender System from the Perspective of Preference Distribution
15. Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches
16. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud
17. Structural Analysis of IWA Social Network
18. Privacy Preserving in Location Data Release: A Differential Privacy Approach
19. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm
20. A DBN-Based Classifying Approach to Discover the Internet Water Army
21. Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks
22. An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance
23. An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network
24. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks
25. Hierarchical Workflow Management in Wireless Sensor Network
26. Frequency-Adaptive Cluster Head Election in Wireless Sensor Network
27. Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition
28. Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network
29. Multi-agent and Workflow-Based Web Service Management Model
30. Similarity Based Semantic Web Service Match
31. Semantic Filtering for DDL-Based Service Composition
32. A Context Model for Service Composition Based on Dynamic Description Logic
33. Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.
34. You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud.
35. Structural Analysis of IWA Social Network.
36. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm.
37. A DBN-Based Classifying Approach to Discover the Internet Water Army.
38. An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.
39. Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.
40. Frequency-Adaptive Cluster Head Election in Wireless Sensor Network.
41. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks.
42. Multi-agent and Workflow-Based Web Service Management Model.
43. Similarity Based Semantic Web Service Match.
44. Semantic Filtering for DDL-Based Service Composition.
45. A Context Model for Service Composition Based on Dynamic Description Logic.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.