PM2. 5 concentration forecasting at surface monitoring sites using GRU neural network based on empirical mode decomposition G Huang, X Li, B Zhang, J Ren Science of the Total Environment 768, 144516, 2021 | 206 | 2021 |
An empirical study on predicting blood pressure using classification and regression trees B Zhang, Z Wei, J Ren, Y Cheng, Z Zheng IEEE access 6, 21758-21768, 2018 | 77 | 2018 |
Health data driven on continuous blood pressure prediction based on gradient boosting decision tree algorithm B Zhang, J Ren, Y Cheng, B Wang, Z Wei Ieee Access 7, 32423-32433, 2019 | 74 | 2019 |
Network intrusion detection method based on PCA and Bayes algorithm B Zhang, Z Liu, Y Jia, J Ren, X Zhao Security and Communication Networks 2018 (1), 1914980, 2018 | 71 | 2018 |
Predicting blood pressure from physiological index data using the SVR algorithm B Zhang, H Ren, G Huang, Y Cheng, C Hu BMC bioinformatics 20, 1-15, 2019 | 47 | 2019 |
Efficiency and effectiveness of web application vulnerability detection approaches: A review B Zhang, J Li, J Ren, G Huang ACM Computing Surveys (CSUR) 54 (9), 1-35, 2021 | 27 | 2021 |
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel X Liu, J Ren, H He, B Zhang, C Song, Y Wang Journal of Network and Computer Applications 185, 103079, 2021 | 20 | 2021 |
CDA: A clustering degree based influential spreader identification algorithm in weighted complex network Q Wang, J Ren, Y Wang, B Zhang, Y Cheng, X Zhao IEEE Access 6, 19550-19559, 2018 | 17 | 2018 |
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network Q Wang, Y Gao, J Ren, B Zhang Computers & Security 126, 103070, 2023 | 15 | 2023 |
An algorithm to find critical execution paths of software based on complex network G Huang, B Zhang, R Ren, J Ren International Journal of Modern Physics C 26 (09), 1550101, 2015 | 13 | 2015 |
The optimal community detection of software based on complex networks G Huang, P Zhang, B Zhang, T Yin, J Ren International Journal of Modern Physics C 27 (08), 1650085, 2016 | 11 | 2016 |
Approach to mine the modularity of software network based on the most vital nodes B Zhang, G Huang, Z Zheng, J Ren, C Hu IEEE Access 6, 32543-32553, 2018 | 6 | 2018 |
Approach to mine influential functions based on software execution sequence B Zhang, G Huang, H He, J Ren IET Software 11 (2), 48-54, 2017 | 6 | 2017 |
A classification method of arrhythmia based on adaboost algorithm B Zhang, J Wen, H Ren Journal of Physics: Conference Series 1682 (1), 012060, 2020 | 5 | 2020 |
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network Q Wang, H Jiang, J Ren, H Liu, X Wang, B Zhang Expert Systems with Applications 244, 123014, 2024 | 4 | 2024 |
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning B Zhang, Y Gao, J Wu, N Wang, Q Wang, J Ren International Journal of Software Engineering and Knowledge Engineering 32 …, 2022 | 4 | 2022 |
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm Z Zheng, B Zhang, Y Liu, J Ren, X Zhao, Q Wang Computers & Security 114, 102572, 2022 | 4 | 2022 |
All‐Packets‐Based Multi‐Rate DDoS Attack Detection Method in ISP Layer X Liu, J Ren, H He, B Zhang, Q Wang, Z Zheng Security and Communication Networks 2022 (1), 7551107, 2022 | 4 | 2022 |
Label propagation algorithm based on node similarity driven by local information C Song, G Huang, B Yin, B Zhang, X Liu International Journal of Modern Physics B 33 (30), 1950363, 2019 | 4 | 2019 |
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns B Zhang, C Shan, M Hussain, J Ren, G Huang International Journal of Software Engineering and Knowledge Engineering 30 …, 2020 | 3 | 2020 |