Author of the publication

Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method.

, , , , , and . J. Univers. Comput. Sci., 25 (3): 203-221 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-paced Safe Co-training for Regression., , and . PAKDD (2), volume 13281 of Lecture Notes in Computer Science, page 71-82. Springer, (2022)Toward Real-world Panoramic Image Enhancement., , , , , , , and . CVPR Workshops, page 2675-2684. Computer Vision Foundation / IEEE, (2020)The impact of information technology on accounting theory, accounting profession, and Chinese Accounting education.. WHICEB, page 103. Association for Information Systems, (2013)Consensus algorithm based on verifiable quantum random numbers., , , , , and . Int. J. Intell. Syst., 37 (10): 6857-6876 (2022)A novel color image encryption scheme using DNA permutation based on the Lorenz system., , , , , and . Multim. Tools Appl., 77 (5): 6243-6265 (2018)BSRU: boosting semi-supervised regressor through ramp-up unsupervised loss., , and . Knowl. Inf. Syst., 66 (5): 2769-2797 (May 2024)Fractional Order Spatiotemporal Chaos with Delay in Spatial Nonlinear Coupling., , , and . Int. J. Bifurc. Chaos, 28 (2): 1850020:1-1850020:19 (2018)Exploring Residential Heterogeneity through Multiscalar Lens: A Case Study of Hangzhou, China., , , , , and . Complex., (2021)A Transparent and Adaptable Method to Extract Colonoscopy and Pathology Data Using Natural Language Processing., , , and . J. Medical Syst., 44 (9): 151 (2020)Metadata model in grid database and its application., , and . CSCWD (1), page 362-366. IEEE Computer Society, (2005)