2025
Multi-objective orbital maneuver optimization of multi-satellite using an adaptive feedback learning NSGA-II.
Swarm Evol. Comput., 2025
2022
Characteristics of an Eight-Quadrant Corner Reflector Involving a Reconfigurable Active Metasurface.
Sensors, 2022
Disturbance observer-based saturated fixed-time pose tracking for feature points of two rigid bodies.
Autom., 2022
Prediction of the Total Phosphorus Index Based on ARIMA.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Research on E-commerce Customer Churn Based on RFM Model and Naive Bayes Algorithm.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Research on the Application of Ant Colony Clustering in Commodity Classification.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
Using improved RFM model to classify consumer in big data environment.
Int. J. Embed. Syst., 2021
Stock Price Forecasting: An Echo State Network Approach.
Comput. Syst. Sci. Eng., 2021
Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec.
IEEE Access, 2021
2020
General process of big data analysis and visualisation.
Int. J. Comput. Sci. Eng., 2020
On the build and application of bank customer churn warning model.
Int. J. Comput. Sci. Eng., 2020
Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Application of ARIMA Model in Financial Time Series in Stocks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
A portable roadside vehicle detection system based on multi-sensing fusion.
Int. J. Sens. Networks, 2019
A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT.
IEEE Access, 2019
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud.
IEEE Access, 2019
Curriculum Reform in Big Data Education at Applied Technical Colleges and Universities in China.
IEEE Access, 2019
Survey on streaming data computing system.
Proceedings of the ACM Turing Celebration Conference - China, 2019
On data visualization for securities investment fund analysis.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
An evolutionary learning and network approach to identifying key metabolites for osteoarthritis.
PLoS Comput. Biol., 2018
An IoT prototype system for environmental sustainability.
Int. J. Sens. Networks, 2018
Singular Value Decomposition-Based Generalized Side Lobe Canceller Beamforming Method for Ultrasound Imaging.
Int. J. Pattern Recognit. Artif. Intell., 2018
A Control Approach Using Network Latency Interval to Preserve Real-Time Causality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
Int. J. Distributed Sens. Networks, 2017
The research of compression and generation of high-precision dynamic focusing delay data for ultrasound beamformer.
Clust. Comput., 2017
2016
Metabolomics Differential Correlation Network Analysis of Osteoarthritis.
Proceedings of the Biocomputing 2016: Proceedings of the Pacific Symposium, 2016
2013
A New Worst-Case Throughput Bound for Oblivious Routing in Odd Radix Mesh Network.
IEEE Comput. Archit. Lett., 2013
An Improved Ant Colony Clustering Method for Network Intrusion Detection.
Proceedings of the IEEE Eighth International Conference on Networking, 2013
2012
An Oblivious Routing Algorithm for 3D Mesh Networks to Achieve a New Worst-Case Throughput Bound.
IEEE Embed. Syst. Lett., 2012
An on-chip global broadcast network design with equalized transmission lines in the 1024-core era.
Proceedings of the International Workshop on System Level Interconnect Prediction, 2012
Oblivious routing design for mesh networks to achieve a new worst-case throughput bound.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012
2011
Performance-Aware Hybrid Algorithm for Mapping IPs onto Mesh-Based Network on Chip.
IEICE Trans. Inf. Syst., 2011
UWB-based Wireless Body Area Networks channel modeling and performance evaluation.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
2010
Convex-Based DOR Routing for Virtualization of NoC.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Energy-aware run-time mapping for homogeneous NoC.
Proceedings of the 2010 International Symposium on System on Chip, SoC 2010, Tampere, 2010
An Algorithm of Webpage Information Hiding Based on Class Selectors.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Game Theory Based Bandwidth Allocation Scheme for Network Virtualization.
Proceedings of the Global Communications Conference, 2010
2008
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Software Watermarking Based on Dynamic Program Slicing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Dynamic K-Gram Based Software Birthmark.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008
2007
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Detection of steganographic information in tags of webpage.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Detection of Hidden Information in Webpage.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007