关注
Wang Dong
Wang Dong
Hangzhou Dianzi University,WuHan university-WHU
在 hdu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Regularized non-negative matrix factorization for identifying differentially expressed genes and clustering samples: A survey
JX Liu, D Wang, YL Gao, CH Zheng, Y Xu, J Yu
IEEE/ACM transactions on computational biology and bioinformatics 15 (3 …, 2017
742017
Characteristic gene selection based on robust graph regularized non-negative matrix factorization
D Wang, JX Liu, YL Gao, CH Zheng, Y Xu
IEEE/ACM transactions on computational biology and bioinformatics 13 (6 …, 2015
362015
A joint-L2, 1-norm-constraint-based semi-supervised feature extraction for RNA-Seq data analysis
JX Liu, D Wang, YL Gao, CH Zheng, JL Shang, F Liu, Y Xu
Neurocomputing 228, 263-269, 2017
332017
An NMF-L2,1-Norm Constraint Method for Characteristic Gene Selection
D Wang, JX Liu, YL Gao, J Yu, CH Zheng, Y Xu
PloS one 11 (7), e0158494, 2016
252016
A class-information-based sparse component analysis method to identify differentially expressed genes on RNA-Seq data
JX Liu, Y Xu, YL Gao, CH Zheng, D Wang, Q Zhu
IEEE/ACM Transactions on Computational Biology and Bioinformatics 13 (2 …, 2015
222015
Privacy-preserving travel time prediction with uncertainty using GPS trace data
F Liu, D Wang, Z Xu
IEEE Transactions on Mobile Computing 22 (1), 417-428, 2021
182021
Privacy risk and preservation in contact tracing of COVID‐19
D Wang, F Liu
Chance 33 (3), 49-55, 2020
172020
A simple review of sparse principal components analysis
CM Feng, YL Gao, JX Liu, CH Zheng, SJ Li, D Wang
Intelligent Computing Theories and Application: 12th International …, 2016
162016
SDoS: Selfish mining-based denial-of-service attack
Q Wang, T Xia, D Wang, Y Ren, G Miao, KKR Choo
IEEE Transactions on Information Forensics and Security 17, 3335-3349, 2022
112022
A p-norm robust feature extraction method for identifying differentially expressed genes
J Liu, JX Liu, YL Gao, XZ Kong, XS Wang, D Wang
PloS one 10 (7), e0133124, 2015
112015
A class-information-based penalized matrix decomposition for identifying plants core genes responding to abiotic stresses
JX Liu, J Liu, YL Gao, JX Mi, CX Ma, D Wang
PloS one 9 (9), e106097, 2014
112014
Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model
R Liu, D Wang, Y Ren, Z Wang, K Guo, Q Qin, X Liu
IEEE Transactions on Information Forensics and Security, 2024
92024
Influence of data errors on differential privacy
T Wang, Z Xu, D Wang, H Wang
Cluster Computing 22 (Suppl 2), 2739-2746, 2019
72019
SNN-PPRL: A secure record matching scheme based on siamese neural network
S Yao, Y Ren, D Wang, Y Wang, W Yin, L Yuan
Journal of Information Security and Applications 76, 103529, 2023
42023
Optimal Selfish Mining-based Denial-of-Service Attack
Q Wang, C Li, T Xia, Y Ren, D Wang, G Zhang, KKR Choo
IEEE Transactions on Information Forensics and Security, 2023
32023
Impact of inaccurate data on Differential Privacy
D Wang, Z Xu
Computers & Security 82, 68-79, 2019
32019
Some examples of privacy-preserving sharing of COVID-19 pandemic data with statistical utility evaluation
F Liu, D Wang, T Yan
BMC Medical Research Methodology 23 (1), 120, 2023
22023
Application of graph regularized non-negative matrix factorization in characteristic gene selection
D Wang, YL Gao, JX Liu, JG Yu, CG Wen
Intelligent Computing Theories and Methodologies: 11th International …, 2015
22015
IGXSS: XSS payload detection model based on inductive GCN
Q Wang, C Li, D Wang, L Yuan, G Pan, Y Cheng, M Hu, Y Ren
International Journal of Network Management, e2264, 2024
12024
联邦学习中的模型逆向攻防研究综述
王冬, 秦倩倩, 郭开天, 刘容轲, 颜伟鹏, 任一支, 罗清彩, 申延召
通信学报 44 (11), 94-109, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20