Jiadong Ren
Orcid: 0000-0002-2245-9133
According to our database1,
Jiadong Ren
authored at least 82 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections.
IEEE Trans. Software Eng., July, 2024
Multim. Tools Appl., January, 2024
DM-IACNN: A Dual-Multiscale Interactive Attention-Based Convolution Neural Network for Automated Detection of Sleep Apnea.
IEEE Trans. Instrum. Meas., 2024
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network.
Expert Syst. Appl., 2024
3DA-NTC: 3D Channel Attention Aided Neural Tensor Completion for Crowdsensing Data Inference.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024
2023
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.
Int. J. Softw. Eng. Knowl. Eng., September, 2023
AAIN: Attentional aggregative interaction network for deep learning based recommender systems.
Neurocomputing, August, 2023
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network.
Comput. Secur., March, 2023
J. Intell. Fuzzy Syst., 2023
An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
Biomed. Signal Process. Control., 2023
2022
An automatic algorithm for software vulnerability classification based on CNN and GRU.
Multim. Tools Appl., 2022
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning.
Int. J. Softw. Eng. Knowl. Eng., 2022
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine.
Int. J. Softw. Eng. Knowl. Eng., 2022
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
ACM Comput. Surv., 2022
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm.
Comput. Secur., 2022
An Embedding Model for Knowledge Graph Completion Based on Graph Sub-Hop Convolutional Network.
Big Data Res., 2022
Proceedings of the Web Information Systems and Applications, 2022
2021
Near-surface PM2.5 prediction combining the complex network characterization and graph convolution neural network.
Neural Comput. Appl., 2021
Deep sparse autoencoder prediction model based on adversarial learning for cross-domain recommendations.
Knowl. Based Syst., 2021
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel.
J. Netw. Comput. Appl., 2021
J. Intell. Fuzzy Syst., 2021
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement.
Comput. Secur., 2021
Maximize Expected Profits by Dynamic After-Sales Service Investment Strategy Based on Word-of-Mouth Marketing in Social Network Shopping.
Complex., 2021
2020
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition.
KSII Trans. Internet Inf. Syst., 2020
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2020
Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network.
Int. J. Netw. Secur., 2020
Mining Key Stations by Constructing the Air Quality Spatial-Temporal Propagation Network.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Intelligent Computing Theories and Application, 2020
2019
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.
Secur. Commun. Networks, 2019
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms.
Secur. Commun. Networks, 2019
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory.
Int. J. Softw. Eng. Knowl. Eng., 2019
IEEE Access, 2019
Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm.
IEEE Access, 2019
DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values.
IEEE Access, 2019
A Novel Learning Model Based on Trust Diffusion and Global Item for Recommender Systems.
IEEE Access, 2019
Automatic Classification Method for Software Vulnerability Based on Deep Neural Network.
IEEE Access, 2019
Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data.
IEEE Access, 2019
A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection.
IEEE Access, 2019
Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace.
IEEE Access, 2019
Mining important nodes in complex software network based on ripple effects of probability.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Secur. Commun. Networks, 2018
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.
Secur. Commun. Networks, 2018
Uncertain maximal frequent subgraph mining algorithm based on adjacency matrix and weight.
Int. J. Mach. Learn. Cybern., 2018
Distributed Frequent Interactive Pattern-Based Complex Software Group Network Stability Measurement.
Int. J. Softw. Eng. Knowl. Eng., 2018
Future Gener. Comput. Syst., 2018
An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees.
IEEE Access, 2018
IEEE Access, 2018
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network.
IEEE Access, 2018
Interactive Multi-model Target Maneuver Tracking Method Based on the Adaptive Probability Correction.
Proceedings of the Advances in Swarm Intelligence - 9th International Conference, 2018
2017
Representative points clustering algorithm based on density factor and relevant degree.
Int. J. Mach. Learn. Cybern., 2017
Int. J. Mach. Learn. Cybern., 2017
Using Fault Infection and Propagation Mining Top Important Function Nodes in Software Execution Complex Network.
J. Inf. Hiding Multim. Signal Process., 2017
IET Softw., 2017
Representative Points and Cluster Attributes Based Incremental Sequence Clustering Algorithm.
Comput. Informatics, 2017
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
New Families of Binary Sequence Pairs with Three-Level Correlation and Odd Composite Length.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Mining frequent biological sequences based on bitmap without candidate sequence generation.
Comput. Biol. Medicine, 2016
Stability analysis and stabilization for T-S fuzzy time-delay systems with mismatched premise membership functions.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
2014
2011
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011
2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
The design of storage structure for sequence in incremental sequential patterns mining.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets.
Proceedings of the Active Media Technology, 5th International Conference, 2009
2008
Sliding-Window Filtering with Constraints of Compactness and Recency in Incremental Database.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
MMFI_DSSW - A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window.
Proceedings of the Knowledge Science, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
IMFTS: High-Speed Mining Frequent Traversal Sequences with Bidirectional Constraints.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006