Jiadong Ren

Orcid: 0000-0002-2245-9133

According to our database1, Jiadong Ren authored at least 82 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections.
IEEE Trans. Software Eng., July, 2024

USBE: User-similarity based estimator for multimedia cold-start recommendation.
Multim. Tools Appl., January, 2024

DM-IACNN: A Dual-Multiscale Interactive Attention-Based Convolution Neural Network for Automated Detection of Sleep Apnea.
IEEE Trans. Instrum. Meas., 2024

An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network.
Expert Syst. Appl., 2024

Multi-Objective Fine-Tuning for Enhanced Program Repair with LLMs.
CoRR, 2024

3DA-NTC: 3D Channel Attention Aided Neural Tensor Completion for Crowdsensing Data Inference.
Proceedings of the International Joint Conference on Neural Networks, 2024

Security Evaluation of Emojis in NLP Tasks.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

2023
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.
Int. J. Softw. Eng. Knowl. Eng., September, 2023

AAIN: Attentional aggregative interaction network for deep learning based recommender systems.
Neurocomputing, August, 2023

An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network.
Comput. Secur., March, 2023

Software defect prediction method based on the heterogeneous integration algorithm.
J. Intell. Fuzzy Syst., 2023

An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
Biomed. Signal Process. Control., 2023

2022
An automatic algorithm for software vulnerability classification based on CNN and GRU.
Multim. Tools Appl., 2022

Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning.
Int. J. Softw. Eng. Knowl. Eng., 2022

Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine.
Int. J. Softw. Eng. Knowl. Eng., 2022

Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
ACM Comput. Surv., 2022

An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm.
Comput. Secur., 2022

An Embedding Model for Knowledge Graph Completion Based on Graph Sub-Hop Convolutional Network.
Big Data Res., 2022

Identifying Influential Spreaders in Complex Networks Based on Degree Centrality.
Proceedings of the Web Information Systems and Applications, 2022

2021
Near-surface PM2.5 prediction combining the complex network characterization and graph convolution neural network.
Neural Comput. Appl., 2021

Deep sparse autoencoder prediction model based on adversarial learning for cross-domain recommendations.
Knowl. Based Syst., 2021

A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel.
J. Netw. Comput. Appl., 2021

Intrusion detection algorithm based on image enhanced convolutional neural network.
J. Intell. Fuzzy Syst., 2021

Low-rate DDoS attacks detection method using data compression and behavior divergence measurement.
Comput. Secur., 2021

Maximize Expected Profits by Dynamic After-Sales Service Investment Strategy Based on Word-of-Mouth Marketing in Social Network Shopping.
Complex., 2021

2020
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition.
KSII Trans. Internet Inf. Syst., 2020

Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2020

Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network.
Int. J. Netw. Secur., 2020

Mining Key Stations by Constructing the Air Quality Spatial-Temporal Propagation Network.
IEEE Access, 2020

A Novel Implicit Trust Recommendation Approach for Rating Prediction.
IEEE Access, 2020

Enhancing Spectrum-Based Fault Localization Using Fault Influence Propagation.
IEEE Access, 2020

Research on Software Community Division Method Based on Inter-node Dependency.
Proceedings of the Intelligent Computing Theories and Application, 2020

2019
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.
Secur. Commun. Networks, 2019

Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms.
Secur. Commun. Networks, 2019

A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory.
Int. J. Softw. Eng. Knowl. Eng., 2019

Regional Spatiotemporal Collaborative Prediction Model for Air Quality.
IEEE Access, 2019

Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm.
IEEE Access, 2019

DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values.
IEEE Access, 2019

A Novel Learning Model Based on Trust Diffusion and Global Item for Recommender Systems.
IEEE Access, 2019

Automatic Classification Method for Software Vulnerability Based on Deep Neural Network.
IEEE Access, 2019

Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data.
IEEE Access, 2019

A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection.
IEEE Access, 2019

Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace.
IEEE Access, 2019

Mining important nodes in complex software network based on ripple effects of probability.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Network Intrusion Detection Method Based on PCA and Bayes Algorithm.
Secur. Commun. Networks, 2018

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.
Secur. Commun. Networks, 2018

Uncertain maximal frequent subgraph mining algorithm based on adjacency matrix and weight.
Int. J. Mach. Learn. Cybern., 2018

Distributed Frequent Interactive Pattern-Based Complex Software Group Network Stability Measurement.
Int. J. Softw. Eng. Knowl. Eng., 2018

Modelling and developing conflict-aware scheduling on large-scale data centres.
Future Gener. Comput. Syst., 2018

An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees.
IEEE Access, 2018

Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes.
IEEE Access, 2018

CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network.
IEEE Access, 2018

Interactive Multi-model Target Maneuver Tracking Method Based on the Adaptive Probability Correction.
Proceedings of the Advances in Swarm Intelligence - 9th International Conference, 2018

2017
Representative points clustering algorithm based on density factor and relevant degree.
Int. J. Mach. Learn. Cybern., 2017

Sequence clustering algorithm based on weighted vector identification.
Int. J. Mach. Learn. Cybern., 2017

Using Fault Infection and Propagation Mining Top Important Function Nodes in Software Execution Complex Network.
J. Inf. Hiding Multim. Signal Process., 2017

Approach to mine influential functions based on software execution sequence.
IET Softw., 2017

Representative Points and Cluster Attributes Based Incremental Sequence Clustering Algorithm.
Comput. Informatics, 2017

Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Perfect Gaussian Integer Sequences of Degree-4 Using Difference Sets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Families of Binary Sequence Pairs with Three-Level Correlation and Odd Composite Length.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Mining frequent biological sequences based on bitmap without candidate sequence generation.
Comput. Biol. Medicine, 2016

Stability analysis and stabilization for T-S fuzzy time-delay systems with mismatched premise membership functions.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

2014
Mining sequential patterns with periodic wildcard gaps.
Appl. Intell., 2014

2011
Hierarchical K-Means Clustering Algorithm Based on Silhouette and Entropy.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
A Clustering Algorithm Based on Matrix over High Dimensional Data Stream.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

The design of storage structure for sequence in incremental sequential patterns mining.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Software Fault Feature Clustering Algorithm Based on Sequence Pattern.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

An Approach for Database Intrusion Detection Based on the Event Sequence Clustering.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Efficient Outlier Detection Algorithm for Heterogeneous Data Streams.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Density-Based Data Streams Clustering over Sliding Windows.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Sliding-Window Filtering with Constraints of Compactness and Recency in Incremental Database.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Sequential Pattern Mining with Inaccurate Event in Temporal Sequence.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
MMFI_DSSW - A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window.
Proceedings of the Knowledge Science, 2007

Find Recent Frequent Items with Sliding Windows in Data Streams.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Index-Based Load Shedding for Streaming Sliding Window Joins.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

On Mining Dynamic Web ClickStreams for Frequent Traversal Sequences.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
IMFTS: High-Speed Mining Frequent Traversal Sequences with Bidirectional Constraints.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006


  Loading...