Seguir
Bing Zhang
Bing Zhang
Otros nombresB Zhang, Zhang Bing
Associate professor of Software engineering,Yanshan University
Dirección de correo verificada de ysu.edu.cn
Título
Citado por
Citado por
Año
PM2. 5 concentration forecasting at surface monitoring sites using GRU neural network based on empirical mode decomposition
G Huang, X Li, B Zhang, J Ren
Science of the Total Environment 768, 144516, 2021
1692021
An empirical study on predicting blood pressure using classification and regression trees
B Zhang, Z Wei, J Ren, Y Cheng, Z Zheng
IEEE access 6, 21758-21768, 2018
732018
Health data driven on continuous blood pressure prediction based on gradient boosting decision tree algorithm
B Zhang, J Ren, Y Cheng, B Wang, Z Wei
Ieee Access 7, 32423-32433, 2019
702019
Network intrusion detection method based on PCA and Bayes algorithm
B Zhang, Z Liu, Y Jia, J Ren, X Zhao
Security and Communication Networks 2018, 1-11, 2018
612018
Predicting blood pressure from physiological index data using the SVR algorithm
B Zhang, H Ren, G Huang, Y Cheng, C Hu
BMC bioinformatics 20, 1-15, 2019
412019
Efficiency and effectiveness of web application vulnerability detection approaches: A review
B Zhang, J Li, J Ren, G Huang
ACM Computing Surveys (CSUR) 54 (9), 1-35, 2021
212021
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel
X Liu, J Ren, H He, B Zhang, C Song, Y Wang
Journal of Network and Computer Applications 185, 103079, 2021
162021
CDA: A clustering degree based influential spreader identification algorithm in weighted complex network
Q Wang, J Ren, Y Wang, B Zhang, Y Cheng, X Zhao
IEEE Access 6, 19550-19559, 2018
162018
An algorithm to find critical execution paths of software based on complex network
G Huang, B Zhang, R Ren, J Ren
International Journal of Modern Physics C 26 (09), 1550101, 2015
142015
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network
Q Wang, Y Gao, J Ren, B Zhang
Computers & Security 126, 103070, 2023
102023
The optimal community detection of software based on complex networks
G Huang, P Zhang, B Zhang, T Yin, J Ren
International Journal of Modern Physics C 27 (08), 1650085, 2016
102016
Research on DoS traffic detection model based on random forest and multilayer perceptron
H He, G Huang, B Zhang, Z Zheng
Security and Communication Networks 2022, 2022
82022
Approach to mine the modularity of software network based on the most vital nodes
B Zhang, G Huang, Z Zheng, J Ren, C Hu
IEEE Access 6, 32543-32553, 2018
62018
Approach to mine influential functions based on software execution sequence
B Zhang, G Huang, H He, J Ren
IET Software 11 (2), 48-54, 2017
62017
A classification method of arrhythmia based on adaboost algorithm
B Zhang, J Wen, H Ren
Journal of Physics: Conference Series 1682 (1), 012060, 2020
52020
Research on Boruta-ET-based anomalous traffic detection model
H He, G Huang, B Zhang, L Qin
Security and Communication Networks 2022, 1-8, 2022
42022
Label propagation algorithm based on node similarity driven by local information
C Song, G Huang, B Yin, B Zhang, X Liu
International Journal of Modern Physics B 33 (30), 1950363, 2019
42019
All-Packets-Based Multi-Rate DDoS Attack Detection Method in ISP Layer
X Liu, J Ren, H He, B Zhang, Q Wang, Z Zheng
Security and Communication Networks 2022, 2022
32022
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm
Z Zheng, B Zhang, Y Liu, J Ren, X Zhao, Q Wang
Computers & Security 114, 102572, 2022
32022
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns
B Zhang, C Shan, M Hussain, J Ren, G Huang
International Journal of Software Engineering and Knowledge Engineering 30 …, 2020
32020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20