335 results on '"Jiadong Ren"'
Search Results
2. Application of e-Beam Voltage Contrast Technique for Overlay Improvement and Process Window Control in Multi-Patterning Interconnect Scheme
3. Dual-granularity lightweight model for vulnerability code slicing method assessment
4. Minimize the impact of rumors by optimizing the control of comments on the complex network
5. Mining Key Stations by Constructing the Air Quality Spatial-Temporal Propagation Network
6. A Novel Implicit Trust Recommendation Approach for Rating Prediction
7. Enhancing Spectrum-Based Fault Localization Using Fault Influence Propagation
8. Automatic Classification Method for Software Vulnerability Based on Deep Neural Network
9. Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm
10. Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace
11. A Novel Learning Model Based on Trust Diffusion and Global Item for Recommender Systems
12. A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection
13. DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values
14. Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data
15. Regional Spatiotemporal Collaborative Prediction Model for Air Quality
16. Maximize Expected Profits by Dynamic After-Sales Service Investment Strategy Based on Word-of-Mouth Marketing in Social Network Shopping
17. Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes
18. CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network
19. An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees
20. Social recommendation model based on user interaction in complex social networks.
21. MpBsmi: A new algorithm for the recognition of continuous biological sequence pattern based on index structure.
22. Mining dynamic noteworthy functions in software execution sequences.
23. 3DA-NTC: 3D Channel Attention Aided Neural Tensor Completion for Crowdsensing Data Inference.
24. Security Evaluation of Emojis in NLP Tasks.
25. USBE: User-similarity based estimator for multimedia cold-start recommendation.
26. DM-IACNN: A Dual-Multiscale Interactive Attention-Based Convolution Neural Network for Automated Detection of Sleep Apnea.
27. SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections.
28. Multi-Objective Fine-Tuning for Enhanced Program Repair with LLMs.
29. DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.
30. Software defect prediction method based on the heterogeneous integration algorithm.
31. An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network.
32. Identifying Influential Spreaders in Complex Networks Based on Degree Centrality.
33. An automatic algorithm for software vulnerability classification based on CNN and GRU.
34. Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning.
35. Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine.
36. Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
37. Research on Software Community Division Method Based on Inter-node Dependency.
38. Intrusion detection algorithm based on image enhanced convolutional neural network.
39. Near-surface PM2.5 prediction combining the complex network characterization and graph convolution neural network.
40. Mining important nodes in complex software network based on ripple effects of probability.
41. A Comprehensive Looks at Data Mining Techniques Contributing to Medical Data Growth: A Survey of Researcher Reviews
42. Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
43. Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network.
44. A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition.
45. An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
46. An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network.
47. AAIN: Attentional aggregative interaction network for deep learning based recommender systems.
48. Interactive Multi-model Target Maneuver Tracking Method Based on the Adaptive Probability Correction.
49. A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory.
50. A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.