CORC

浏览/检索结果: 共90条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Identifying High Influential Users in Social Media by Analyzing Users' Behaviors 期刊论文
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 卷号: 36, 期号: 6, 页码: 6207-6218
作者:  Zhao, Zhongying;  Zhou, Hui;  Zhang, Bijun;  Ji, Fujiao;  Li, Chao
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/11
Traffic accident data mining based on association rules theory 期刊论文
Frontiers in Artificial Intelligence and Applications, 2019, 卷号: 314, 页码: 330-340
作者:  Li, Meiying;  Li, Meiye;  Hu, Xiaoxia;  Li, Yu
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/11
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 103751-103759
作者:  Men, Jiaping;  Xu, Guangquan;  Han, Zhen;  Sun, Zhonghao;  Zhou, Xiaojun
收藏  |  浏览/下载:15/0  |  提交时间:2019/12/11
Application of Data Mining in an Intelligent Early Warning System for Rock Bursts 期刊论文
PROCESSES, 2019, 卷号: 7, 期号: 2
作者:  Zhu, Xuejun;  Jin, Xiaona;  Jia, Dongdong;  Sun, Naiwei;  Wang, Pu
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Data mining-based model for motion target trajectory prediction 期刊论文
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 卷号: 37, 期号: 1, 页码: 371-379
作者:  Liu, Lizheng;  Liu, Fangai;  Ky, Byron
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/11
Improved ELM optimization model for automobile insurance fraud identification based on AFSA 期刊论文
INTELLIGENT DATA ANALYSIS, 2019, 卷号: 23, 页码: S67-S85
作者:  Yan, Chun;  Li, Meixuan;  Liu, Wei
收藏  |  浏览/下载:14/0  |  提交时间:2019/12/11
A Public Auditing Scheme with Data Recovery 会议论文
12th International Conference on Genetic and Evolutionary Computing, ICGEC 2018, December 14, 2018 - December 17, 2018
作者:  Wu, Tsu-Yang;  Chen, Chien-Ming;  Wang, King-Hang;  Wu, Jimmy Ming-Tai;  Pan, Jeng-Shyang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
A simple image encryption algorithm based on logistic map 会议论文
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018, October 12, 2018 - October 14, 2018
作者:  Wu, Tsu-Yang;  Wang, King-Hang;  Chen, Chien-Ming;  Wu, Jimmy Ming-Tai;  Pan, Jeng-Shyang
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/31
Security analysis of a public key authenticated encryption with keyword search scheme 会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:  Wu, Tsu-Yang;  Chen, Chien-Ming;  Wang, King-Hang;  Wu, Jimmy Ming-Tai;  Pan, Jeng-Shyang
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/31
A comparative study on community detection methods in complex networks 期刊论文
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 卷号: 35, 期号: 1, 页码: 1077-1086
作者:  Zhao, Zhongying;  Zheng, Shaoqiang;  Li, Chao;  Sun, Jinqing;  Chang, Liang
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/11


©版权所有 ©2017 CSpace - Powered by CSpace