×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [8]
湖南大学 [5]
中国医学科学院 北京... [5]
山东大学 [3]
海洋研究所 [1]
武汉大学 [1]
更多...
内容类型
期刊论文 [25]
发表日期
2019 [25]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Analysis of cultivable aerobic bacterial community composition and screening for facultative sulfate-reducing bacteria in marine corrosive steel
期刊论文
JOURNAL OF OCEANOLOGY AND LIMNOLOGY, 2019, 卷号: 37, 期号: 2, 页码: 600-614
作者:
Li Xiaohong
;
Xiao Hui
;
Zhang Wenjun
;
Li Yongqian
;
Tang Xuexi
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2019/08/28
marine corrosive steel
cultivable aerobic bacteria
facultative sulfate-reducing bacteria
bacterial community composition
16S rRNA gene sequencing
Mobile Health (mHealth) technology for improved screening, patient involvement and optimising integrated care in atrial fibrillation: The mAFA (mAF-App) II randomised trial
期刊论文
INTERNATIONAL JOURNAL OF CLINICAL PRACTICE, 2019, 卷号: 73, 期号: 7
作者:
Wang Zulu
;
Xv Bing
;
Liu Liming
;
Jin Yuanzhe
;
Xia Yunlong
收藏
  |  
浏览/下载:76/0
  |  
提交时间:2019/12/04
Mobile Health (mHealth) technology for improved screening, patient involvement and optimising integrated care in atrial fibrillation: The mAFA (mAF-App) II randomised trial
期刊论文
INTERNATIONAL JOURNAL OF CLINICAL PRACTICE, 2019, 卷号: 73, 期号: 7
作者:
Guo, Yutao
;
Lane, Deirdre A.
;
Wang, Liming
;
Chen, Yundai
;
Lip, Gregory Y. H.
收藏
  |  
浏览/下载:62/0
  |  
提交时间:2019/12/05
Practical characterization of large networks using neighborhood information
期刊论文
Knowledge and Information Systems, 2019, 卷号: 58, 页码: 701-728
作者:
Wang, Pinghui
;
Zhao, Junzhou
;
Ribeiro, Bruno
;
Lui, John C. S.
;
Towsley, Don
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/19
Crawling
Graph sampling
Online social network
Random walk
Sampling online social networks by random walk with indirect jumps
期刊论文
Data Mining and Knowledge Discovery, 2019, 卷号: 33, 页码: 24-57
作者:
Zhao, Junzhou
;
Wang, Pinghui
;
Lui, John C. S.
;
Towsley, Don
;
Guan, Xiaohong
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/11/19
Auxiliary graph
Bipartite graphs
Estimation theory
Graph samplings
Layered network
On-line social networks
Random Walk
Real-world networks
DIGGER: Detect Similar Groups in Heterogeneous Social Networks
期刊论文
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2019, 卷号: 13
作者:
Liu, Xiaoming
;
Shen, Chao
;
Guan, Xiaohong
;
Zhou, Yadong
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/11/19
Heterogeneous networks
detecting similar groups
graph spectral
linear mixed-effects
Enhanced Hidden Moving Target Defense in Smart Grids
期刊论文
IEEE Transactions on Smart Grid, 2019, 卷号: 10, 页码: 2208-2223
作者:
Tian, Jue
;
Tan, Rui
;
Guan, Xiaohong
;
Liu, Ting
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2019/11/19
Computer security
False data injection attack
moving target defense
Power measurement
smart grid
Smart grids
State estimation
state estimation.
Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams
期刊论文
IEEE Transactions on Parallel and Distributed Systems, 2019, 卷号: 30, 页码: 300-314
作者:
wang, pinghui
;
Wang, Xiangyu
;
Tao, Jing
;
Zhang, Peng
;
Guan, Xiaohong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/19
Data stream
Distributed database
IP networks
Random access memory
Sampling method
sketch
Learning edge weights in file co-occurrence graphs for malware detection
期刊论文
Data Mining and Knowledge Discovery, 2019, 卷号: 33, 页码: 168-203
作者:
Mao, Weixuan
;
Cai, Zhongmin
;
Zeng, Bo
;
Guan, Xiaohong
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/11/19
Bipartite graph
Edge-weight learning
Graph based semi-supervised learning
Malware detection
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective
期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 486-502
作者:
Ma, Xiaobo
;
Li, Jianfeng
;
Tang, Yajuan
;
An, Bo
;
Guan, Xiaohong
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/11/19
Autonomous systems
Collateral damage
End-to-End communication
Flooding attacks
Incentive design
Internet infrastructure
Internet infrastructure security
Nash bargaining
©版权所有 ©2017 CSpace - Powered by
CSpace