Author of the publication

A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale.

, , , , and . Sensors, 20 (11): 3057 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 3257-3274 (2021)FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification., , , and . Entropy, 24 (7): 919 (2022)GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem., , , , and . IEEE Access, (2020)A Computer Network Defense Policy Refinement Method., , , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 122-133. Springer, (2013)An Evaluation Model of CNO Intelligence Information Confidence., , , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 400-412. Springer, (2009)Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability., , , , and . Web Intelligence, page 694-701. IEEE Computer Society, (2012)Design and Implementation of Bus Net Routing Algorithm., , , , and . CIS, page 1474-1478. IEEE Computer Society, (2011)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation., , and . IEEE Communications Letters, 19 (7): 1169-1172 (2015)An Information Source Identification Algorithm Based on Shortest Arborescence of Network., , , and . ICSCA, page 442-446. ACM, (2019)