Loading...
Images of Yuanquan Shi
(0 from 0 )1
0
0
News
Program - NPC 2021npc2021.dnac.org › Program - NPC 2021
npc2021.dnac.org
Haodong Lin, Jun Li, Zhibing Sha, Zhigang Cai, Jianwei Liao and Yuanquan Shi. 17:45. Conclusion – Day 1. DAY 2 – November 4, :00, LUNCH.
Network Profiles
LinkedIn: Yuanquan SHI | Professional Profile
View Yuanquan SHI’S profile on LinkedIn, the world's largest professional community. Yuanquan’s education is listed on their profile. See the complete profile on ...
Xiaowu Deng papers and PDFs · OA.mgoa.mg › author › xiaowu-deng-a
oa.mg
Yuanquan Shi, Wei Li, Yu Zhang, Xiaowu Deng, Dong Yin, Shunping Deng. Computer security. Intrusion detection system. Computer science. Dark Mode
Yuanquan Shi | Semantic Scholar
www.semanticscholar.org
Semantic Scholar profile for Yuanquan Shi, with 2 highly influential citations and 22 scientific research papers.
Business Profiles
Books & Literature
Yuanquan Shi - Articles - Scientific Research Publishingscirp.org › journal › articles.aspx › journal › articles
scirp.org
Yuanquan Shi.
Chaotic Time Series Prediction Using Immune Optimization Theory ...ur.booksc.eu › book
ur.booksc.eu
... Series Prediction Using Immune Optimization Theory Yuanquan Shi Yanming Fu ... To cite this article: Yuanquan Shi , Xiaojie Liu , Tao Li , Xiaoning Peng ...
The Age of Irreverence: A New History of Laughter in China - 1Libhi.1lib.limited › book
hi.1lib.limited
Xiandai wubai jia yuanquan shi ji 現代 五百家圓圈詩集 (Palindromic Poems by Five Hundred Poets). Shanghai: Guangyi shuju, The world today seems ...
Jia-Qi Zhong - Inspire HEPinspirehep.net › authors
inspirehep.net
25 Feb · Juxiu Zhong. ,. Bolin Liao. ,. Yuanquan Shi. ,. Rongbo Lu. (Jun 11, 2022). Published in: Int.J.Mod.Phys.B 36 (2022) 21,
Related Documents
Journal: IJ Network Security - Researchrresearchr.org › journal › ijnsec
researchr.org
Yuanquan Shi, Hong Shen. Anomaly Detection for Network Flow Using Immune Network and Density Peak. I. J. Network Security, 22(2): ,
Yuanquan Shi - Homedl.acm.org › contrib › abs
dl.acm.org
Yuanquan Shi ; Published Items by Year ; Keywords. network security situation artificial immune artificial immunology detector fuzzy grey model ...
[PDF] Beijing-Style Soft Power: A Different Alliance Universitydrupal.alliance.edu.in › drupal › sites › default › files
drupal.alliance.edu.in
'Zhonghua wenhua 'zou chuqu' de dongli yuanquan shi shenme [What is the source of. Chinese Cultural Projection?]', CPC News, 3 August 2017, ...
[PDF] Table of Contents ofwww.ijpe-online.com › file › B-Vol13-No5-Front-Inside-ToC
www.ijpe-online.com
Jing Lin, Chuqiao Mi, and Yuanquan Shi. Approach of Tamper Detection for Sensitive Data based on. Negotiable Hash Algorithm
Scientific Publications
BibTeX records: Renfa Li - DBLPdblp.uni-trier.de › Persons › Renfa Li
dblp.uni-trier.de
@inproceedings{DBLP:conf/icycsee/ShiPLZ17, author = {Yuanquan Shi and Xiaoning Peng and Renfa Li and Yu Zhang}, editor = {Beiji Zou and Min Li and Hongzhi ...
Yuanquan Shi - dblpdblp.dagstuhl.de › Persons
dblp.dagstuhl.de
List of computer science publications by Yuanquan Shi Yuanquan Shi , Hong Shen: Unsupervised anomaly detection for network traffic using artificial ...
Adaptive one-way SLC/TLC mode conversion in high density SSDswww.jstage.jst.go.jp › article › elex › _article › -char
www.jstage.jst.go.jp
Mingwang Zhao, Zhigang Cai, Lihao Song, Yuanquan Shi, Min Huang. 著者情報. Mingwang Zhao. College of Computer and Information Science, Southwest University ...
A danger-theory-based immune network optimization PubMedpubmed.ncbi.nlm.nih.gov › ...
pubmed.ncbi.nlm.nih.gov
Authors. Ruirui Zhang , Tao Li, Xin Xiao, Yuanquan Shi. Affiliation. 1 College of Computer Science, Sichuan University, Chengdu , ...
Publications
International Conference on Internet of Things and Machine SPIEspie.org › Publications › Proceedings › Volume
spie.org
22 Apr · Author(s): Le-Bing Zhang; Juan Cai; Fei Peng; Min Long; Yuanquan Shi. Show Abstract. Face morphing attack has become a severe threat to the ...
A Danger-Theory-Based Immune Network Optimization Algorithm
www.hindawi.com
Existing artificial immune optimization algorithms reflect a number of shortcomings, such as premature convergence and poor local search ability. This paper...
An immunity-based time series prediction approach and its application...
link.springer.com
To effectively improve the prediction precision of network security situation and prevent the large-scale network security attacks, an immunity-based time
Airiti Library華藝線上圖書館_Network+Security+Situation+ ...www.airitilibrary.com › Index
www.airitilibrary.com
Network Security Situation Prediction Approach Based on Clonal Selection and SCGM(1,1)c Model. Yuanquan Shi ; Renfa Li ; Xiaoning Peng ; Guangxue Yue.
Reports & Statements
Google Groups: 締切延長: PDCAT'22 (投稿締切 8月17日) - Google Groupsgroups.google.com › swopp-announce
2 Aug · Yuanquan Shi, Huaihua University - Toyotaro Suzumura, The University of Tokyo - Jubee Tada, Yamagata University
Miscellaneous
Yuanquan SHI | Professional Profile
www.linkedin.com
View Yuanquan SHI’S professional profile on LinkedIn. LinkedIn is the world's largest business network, helping professionals like Yuanquan SHI discover inside ...
Accepted Papers - ICPP'2022icpp22.gitlabpages.inria.fr › prog
icpp22.gitlabpages.inria.fr
... Jianwei Liao and Yuanquan Shi. MG-GCN: Scalable Multi-GPU Full Batch GCN Training Framework, Muhammed Fatih Balin, Kaan Sancak and Umit V. Catalyurek.
Analysis of network traffic features for anomaly detection - Scinapsewww.scinapse.io › papers
www.scinapse.io
2 Authors (Yuanquan Shi, Hong Shen). Read Later. A vector convolutional deep autonomous learning classifier for detection of cyber attacks.
Balazs Gerofibgerofi.github.io
bgerofi.github.io
Haodong Lin, Zhibing Sha, Jun Li, Zhigang Cai, Balazs Gerofi, Jianwei Liao, Yuanquan Shi: “DRAM Cache Management with Request Granularity for NAND-based ...
CFP - ICSSHBDA EasyChairwww.easychair.org › cfp › ICSSHBDA_2021
www.easychair.org
Yuanquan Shi, Professor, Dean of school of computer science and engineering at Huaihua University, Director of Key Laboratory of Wuling-Mountain Health Big ...
Committee - ICBCTISwww.bctis.net › committee
www.bctis.net
Yuanquan Shi, Professor, Dean of school of computer science and engineering at Huaihua University, Director of Key Laboratory of Wuling-Mountain Health Big ...
Committee - ICEITSA 2021www.iceitsaconference.com › menu › committee
www.iceitsaconference.com
Yuanquan Shi, Huaihua University, China. Prof. Moh Yasin, Airlangga University, Indonesia. Prof.Yanan Zhang, Northeastern University, China.
Grant - Grants Data Portalpurl.org › au-research › grants › arc
purl.org
... associates (Dr Lunkun Guo, Dr Hui Tian), trained 3 PhD students (Kewen Liao, Ba-Dung Le, Zhigang Lu) and 2 visiting scholars (Yuanquan Shi, Yan Wang).
Huaihua University Rankings - AD Scientific Index 2022www.adscientificindex.com › university › Huaihua+University
www.adscientificindex.com
Most Popular Article : A competition on generalized software-based face presentation attack detection in mobile scenario Yuanquan Shi.
PDCAT Tohoku Universitywww.hpc.is.tohoku.ac.jp › pdcat2022
www.hpc.is.tohoku.ac.jp
Yuanquan Shi, Huaihua University Toyotaro Suzumura, The University of Tokyo Jubee Tada, Yamagata University Atsuko Takefusa, National Institute of ...
Play 游戲大觀 | Age of Irreverence: A New History of Laughter in Chinacalifornia.universitypressscholarship.com › upso chapter-3
california.universitypressscholarship.com
See Zhu, Xiandai wubai jia yuanquan shi ji, cited in Mullaney, “The Semi-Colonial Semi-Colon.” A pair of “New Reversible Poems: Flight of the Wild Goose and ...
Shi - Journal of Internet Technologyjit.ndhu.edu.tw › printerFriendly
jit.ndhu.edu.tw
Network Security Situation Prediction Approach Based on Clonal Selection and SCGM(1,1)c Model. Yuanquan Shi, Renfa Li, Xiaoning Peng, Guangxue Yue ...
Statistical Movement Classification based on Gram-Schmidt Transformwww.computer.org › pds › api › csdl › proceedings › download-article › pdf
www.computer.org
Yuanquan Shi. 1.School of Computer Science and Engineering, Huaihua. University. 2. Key Laboratory of Wuling-Mountain Health Big Data.
Top 20 Intelligent Service Robotics papers published in 2015typeset.io › Journal Directory › Intelligent Service Robotics
typeset.io
Yuanquan Shi 1, Renfa Li 2, Yu Zhang 3, Xiaoning Peng 1•Institutions (3). 31 Dec Intelligent Service Robotics. TL;DR: In ITSPA, the concepts and formal ...
Verifiable Digital Object Identifier - Min-Shiang Hwang @isrc.ccs.asia.edu.tw › ~vdoi
isrc.ccs.asia.edu.tw
Yuanquan Shi and Hong Shen. VDOI: Online: :01:09. Download (10). Adaptive Access Control Model of Vehicular Network Big ...
committee - ICCBDAI2022www.iccbdai.org › committee2022
www.iccbdai.org
Yuanquan Shi. Huaihua University, China. Prof.Chunwei Tian. Northwestern Polytechnical University, China. Technical Chairs. Prof. Paras Nath Singh.
美国ACCDON公司旗下品牌 - SCI论文修改www.letpub.com.cn › ...
www.letpub.com.cn
Author: Yuanquan Shi, Renfa Li, Yu Zhang, Xiaoning Peng Journal: Intelligent Service Robotics, 2014, Vol.8, 1-22, DOI: s z DOI.
Noise robust face morphing detection method - SPIE Digital Librarywww.spiedigitallibrary.org › full
www.spiedigitallibrary.org
22 Apr · Le-Bing Zhang, Juan Cai, Fei Peng, Min Long, and Yuanquan Shi "Noise robust face morphing detection method", Proc.
Research Article Improved CNN Method for Crop Pest Identification ...search.proquest.com › openview › 1.pdf
search.proquest.com
16 Mar · Yiwen Liu ,1,2,3 Xian Zhang ,1,2,3 Yanxia Gao ,1 Taiguo Qu ,1 and Yuanquan Shi 1,2,3. 1School of Computer Science and Engineering, ...
Unsupervised anomaly detection for network Springer Professionalwww.springerprofessional.de › unsupervised-anomaly-detection-for-netwo...
www.springerprofessional.de
27 Mar · Unsupervised anomaly detection for network traffic using artificial immune network. Authors: Yuanquan Shi, Hong Shen.
Related search requests for Yuanquan Shi
Hong Shen |
Person "Shi" (2) Forename "Yuanquan" (3) Name "Shi" (2648) |
sorted by relevance / date