AI and Machine Learning for Industrial Security With Level Discovery Method
暂无分享,去创建一个
Meikang Qiu | Jing Wu | He Nai | Hao Jiang | Meikang Qiu | Jing Wu | Hao Jiang | He Nai
[1] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[2] Jiang Xiao,et al. LDV: A Lightweight DAG-Based Blockchain for Vehicular Social Networks , 2020, IEEE Transactions on Vehicular Technology.
[3] Xin Wang,et al. Association Rules with Graph Patterns , 2015, Proc. VLDB Endow..
[4] Jong Hyuk Park,et al. Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks , 2017, Future Gener. Comput. Syst..
[5] Xingshe Zhou,et al. Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings , 2012, IEEE Transactions on Knowledge and Data Engineering.
[6] Meikang Qiu,et al. Three-phase time-aware energy minimization with DVFS and unrolling for Chip Multiprocessors , 2012, J. Syst. Archit..
[7] Pingzhi Fan,et al. Modeling and Performance Analysis of a Tracking-Area-List-Based Location Management Scheme in LTE Networks , 2016, IEEE Transactions on Vehicular Technology.
[8] Shen Su,et al. Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..
[9] Kamalakar Karlapalem,et al. MARGIN: Maximal Frequent Subgraph Mining , 2006, ICDM.
[10] Alexandre Termier,et al. DIGDAG, a First Algorithm to Mine Closed Frequent Embedded Sub-DAGs , 2007, MLG.
[11] Yang Xu,et al. Extending association rules with graph patterns , 2020, Expert Syst. Appl..
[12] Yujie Li,et al. User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications , 2021, IEEE Transactions on Intelligent Transportation Systems.
[13] Zhiyong Chen,et al. Effect of Adding Edges to Consensus Networks With Directed Acyclic Graphs , 2017, IEEE Transactions on Automatic Control.
[14] Huimin Lu,et al. The Cognitive Internet of Vehicles for Autonomous Driving , 2019, IEEE Network.
[15] Joel J. P. C. Rodrigues,et al. Energy-Efficient Monitoring of Fire Scenes for Intelligent Networks , 2020, IEEE Network.
[16] Meikang Qiu,et al. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software , 2006, IEEE Transactions on Computers.
[17] Yujie Li,et al. Deep Fuzzy Hashing Network for Efficient Image Retrieval , 2021, IEEE Transactions on Fuzzy Systems.
[18] Srinivasan Ramasubramanian,et al. Independent Directed Acyclic Graphs for Resilient Multipath Routing , 2012, IEEE/ACM Transactions on Networking.
[19] Huimin Lu,et al. Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning , 2018, IEEE Internet of Things Journal.
[20] Jiawei Han,et al. gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[21] Khan Muhammad,et al. DeepReS: A Deep Learning-Based Video Summarization Strategy for Resource-Constrained Industrial Surveillance Scenarios , 2020, IEEE Transactions on Industrial Informatics.
[22] M. Newman. Clustering and preferential attachment in growing networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[23] Xing Xie,et al. Design a batched information retrieval system based on a concept-lattice-like structure , 2018, Knowl. Based Syst..
[24] Flávia Bernardini,et al. Mining direct acyclic graphs to find frequent substructures - An experimental analysis on educational data , 2019, Inf. Sci..
[25] Longbing Cao,et al. A new framework for mining frequent interaction patterns from meeting databases , 2015, Eng. Appl. Artif. Intell..
[26] Masoud Asadpour,et al. Community Aware Random Walk for Network Embedding , 2017, Knowl. Based Syst..
[27] Albert Y. Zomaya,et al. Prune and Plant: Efficient Placement and Parallelism of Virtual Network Functions , 2020, IEEE Transactions on Computers.
[28] Wang Peng,et al. Numerical and experimental study on the maneuverability of an active propeller control based wave glider , 2020 .
[29] Zhi Chen,et al. Data Allocation for Hybrid Memory With Genetic Algorithm , 2015, IEEE Transactions on Emerging Topics in Computing.
[30] Daniel Gatica-Perez,et al. Human interaction discovery in smartphone proximity networks , 2013, Personal and Ubiquitous Computing.
[31] Lizhong Xu,et al. Construction of a Hierarchical Feature Enhancement Network and Its Application in Fault Recognition , 2021, IEEE Transactions on Industrial Informatics.
[32] Xiaohui Tao,et al. On relational learning and discovery in social networks: a survey , 2019, Int. J. Mach. Learn. Cybern..
[33] Irfan Mehmood,et al. Edge Intelligence-Assisted Smoke Detection in Foggy Surveillance Environments , 2020, IEEE Transactions on Industrial Informatics.
[34] Linyuan Lü,et al. Predicting missing links via local information , 2009, 0901.0553.
[35] A. Barabasi,et al. Hierarchical Organization of Modularity in Metabolic Networks , 2002, Science.
[36] Jiong Yang,et al. SPIN: mining maximal frequent subgraphs from graph databases , 2004, KDD.
[37] Daniel Schall,et al. A multi-criteria ranking framework for partner selection in scientific collaboration environments , 2014, Decis. Support Syst..
[38] Khan Muhammad,et al. Cost-Effective Video Summarization Using Deep CNN With Hierarchical Weighted Fusion for IoT Surveillance Networks , 2020, IEEE Internet of Things Journal.
[39] Huimin Lu,et al. Brain Intelligence: Go beyond Artificial Intelligence , 2017, Mobile Networks and Applications.
[40] Jibo Wei,et al. Scheduling directed acyclic graphs with optimal duplication strategy on homogeneous multiprocessor systems , 2020, J. Parallel Distributed Comput..
[41] Huimin Lu,et al. Underwater image dehazing using joint trilateral filter , 2014, Comput. Electr. Eng..
[42] John F. Roddick,et al. Journal of Graph Algorithms and Applications Fp-graphminer – a Fast Frequent Pattern Mining Algorithm for Network Graphs , 2022 .
[43] M. Newman,et al. Vertex similarity in networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.