Information security risk management framework for the cloud computing environments X Zhang, N Wuwong, H Li, X Zhang 2010 10th IEEE international conference on computer and information …, 2010 | 253 | 2010 |
A survey on the techniques, applications, and performance of short text semantic similarity M Han, X Zhang, X Yuan, J Jiang, W Yun, C Gao Concurrency and Computation: Practice and Experience 33 (5), e5971, 2021 | 46 | 2021 |
Knowledge modeling: A survey of processes and techniques W Yun, X Zhang, Z Li, H Liu, M Han International Journal of Intelligent Systems 36 (4), 1686-1720, 2021 | 42 | 2021 |
Data and knowledge-driven named entity recognition for cyber security C Gao, X Zhang, H Liu Cybersecurity 4 (1), 1-13, 2021 | 37 | 2021 |
A review on cyber security named entity recognition C Gao, X Zhang, M Han, H Liu Frontiers of Information Technology & Electronic Engineering 22 (9), 1153-1168, 2021 | 28 | 2021 |
A knowledge graph completion model based on contrastive learning and relation enhancement method LY Li, X Zhang, YB Ma, C Gao, J Wang, Y Yu, Z Yuan, Q Ma Knowledge-Based Systems 256, 109889, 2022 | 22 | 2022 |
Enhancing recommendations with contrastive learning from collaborative knowledge graph Y Ma, X Zhang, C Gao, Y Tang, L Li, R Zhu, C Yin Neurocomputing 523, 103-115, 2023 | 15 | 2023 |
Tradeoff analysis for conflicting software non-functional requirements X Zhang, X Wang IEEE Access 7, 156463-156475, 2019 | 13 | 2019 |
A joint extraction model of entities and relations based on relation decomposition C Gao, X Zhang, H Liu, W Yun, J Jiang International Journal of Machine Learning and Cybernetics 13 (7), 1833-1845, 2022 | 10 | 2022 |
Implementation of a suggested E-commerce model based on SET protocol X Zhang, Q Huang, P Peng 2010 Eighth ACIS International Conference on Software Engineering Research …, 2010 | 10 | 2010 |
BPR: Blockchain-Enabled Efficient and Secure Parking Reservation Framework with Block Size Dynamic Adjustment Method J Wang, C Zhu, C Miao, R Zhu, X Zhang, Y Tang, H Huang, C Gao IEEE Transactions on Intelligent Transportation Systems 24 (3), 3555-3570, 2022 | 9 | 2022 |
ERGM: A multi-stage joint entity and relation extraction with global entity match C Gao, X Zhang, LY Li, JH Li, R Zhu, KP Du, QY Ma Knowledge-Based Systems 271, 110550, 2023 | 8 | 2023 |
Correctness of aspect-oriented business process modeling X Wang, X Zhang, T Li, J Liu, Q Chen Business Process Management Journal 24 (2), 537-566, 2018 | 8 | 2018 |
Change-oriented open source software process simulation X Zhang, X Wang, Y Kang Ieee Access 6, 70145-70163, 2018 | 7 | 2018 |
Trade-Off costs of software non-functional requirements 张璇, 王旭, 李彤, 白川, 康燕妮 Journal of Software 28 (5), 1247-1270, 2016 | 6 | 2016 |
KG2Lib: knowledge-graph-based convolutional network for third-party library recommendation J Zhao, X Zhang, C Gao, Z Li, B Wang The Journal of Supercomputing 79 (1), 1-26, 2023 | 5 | 2023 |
LDA Model and Network Embedding-Based Collaborative Filtering Recommendation Z Tang, X Zhang, J Niu 2019 6th International Conference on Dependable Systems and Their …, 2020 | 5 | 2020 |
Formal analysis to non-functional requirements of trustworthy software 张璇, 李彤, 王旭, 于倩, 郁湧, 朱锐 Journal of Software 26 (10), 2545-2566, 2015 | 5 | 2015 |
Privacy Protection of Personal Education Information on Blockchain H Deng, X Zhang, J Jiang, J Wang, H Huang International Journal of Performability Engineering 18 (5), 317, 2022 | 4 | 2022 |
Software security measurement based on information entropy and attack surface X Zhang, J XU Journal of Computer Applications 33 (01), 19, 2013 | 4 | 2013 |