Regularized non-negative matrix factorization for identifying differentially expressed genes and clustering samples: A survey JX Liu, D Wang, YL Gao, CH Zheng, Y Xu, J Yu IEEE/ACM transactions on computational biology and bioinformatics 15 (3 …, 2017 | 74 | 2017 |
Characteristic gene selection based on robust graph regularized non-negative matrix factorization D Wang, JX Liu, YL Gao, CH Zheng, Y Xu IEEE/ACM transactions on computational biology and bioinformatics 13 (6 …, 2015 | 36 | 2015 |
A joint-L2, 1-norm-constraint-based semi-supervised feature extraction for RNA-Seq data analysis JX Liu, D Wang, YL Gao, CH Zheng, JL Shang, F Liu, Y Xu Neurocomputing 228, 263-269, 2017 | 33 | 2017 |
An NMF-L2,1-Norm Constraint Method for Characteristic Gene Selection D Wang, JX Liu, YL Gao, J Yu, CH Zheng, Y Xu PloS one 11 (7), e0158494, 2016 | 25 | 2016 |
A class-information-based sparse component analysis method to identify differentially expressed genes on RNA-Seq data JX Liu, Y Xu, YL Gao, CH Zheng, D Wang, Q Zhu IEEE/ACM Transactions on Computational Biology and Bioinformatics 13 (2 …, 2015 | 22 | 2015 |
Privacy-preserving travel time prediction with uncertainty using GPS trace data F Liu, D Wang, Z Xu IEEE Transactions on Mobile Computing 22 (1), 417-428, 2021 | 18 | 2021 |
Privacy risk and preservation in contact tracing of COVID‐19 D Wang, F Liu Chance 33 (3), 49-55, 2020 | 17 | 2020 |
A simple review of sparse principal components analysis CM Feng, YL Gao, JX Liu, CH Zheng, SJ Li, D Wang Intelligent Computing Theories and Application: 12th International …, 2016 | 16 | 2016 |
SDoS: Selfish mining-based denial-of-service attack Q Wang, T Xia, D Wang, Y Ren, G Miao, KKR Choo IEEE Transactions on Information Forensics and Security 17, 3335-3349, 2022 | 11 | 2022 |
A p-norm robust feature extraction method for identifying differentially expressed genes J Liu, JX Liu, YL Gao, XZ Kong, XS Wang, D Wang PloS one 10 (7), e0133124, 2015 | 11 | 2015 |
A class-information-based penalized matrix decomposition for identifying plants core genes responding to abiotic stresses JX Liu, J Liu, YL Gao, JX Mi, CX Ma, D Wang PloS one 9 (9), e106097, 2014 | 11 | 2014 |
Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model R Liu, D Wang, Y Ren, Z Wang, K Guo, Q Qin, X Liu IEEE Transactions on Information Forensics and Security, 2024 | 9 | 2024 |
Influence of data errors on differential privacy T Wang, Z Xu, D Wang, H Wang Cluster Computing 22 (Suppl 2), 2739-2746, 2019 | 7 | 2019 |
SNN-PPRL: A secure record matching scheme based on siamese neural network S Yao, Y Ren, D Wang, Y Wang, W Yin, L Yuan Journal of Information Security and Applications 76, 103529, 2023 | 4 | 2023 |
Optimal Selfish Mining-based Denial-of-Service Attack Q Wang, C Li, T Xia, Y Ren, D Wang, G Zhang, KKR Choo IEEE Transactions on Information Forensics and Security, 2023 | 3 | 2023 |
Impact of inaccurate data on Differential Privacy D Wang, Z Xu Computers & Security 82, 68-79, 2019 | 3 | 2019 |
Some examples of privacy-preserving sharing of COVID-19 pandemic data with statistical utility evaluation F Liu, D Wang, T Yan BMC Medical Research Methodology 23 (1), 120, 2023 | 2 | 2023 |
Application of graph regularized non-negative matrix factorization in characteristic gene selection D Wang, YL Gao, JX Liu, JG Yu, CG Wen Intelligent Computing Theories and Methodologies: 11th International …, 2015 | 2 | 2015 |
IGXSS: XSS payload detection model based on inductive GCN Q Wang, C Li, D Wang, L Yuan, G Pan, Y Cheng, M Hu, Y Ren International Journal of Network Management, e2264, 2024 | 1 | 2024 |
联邦学习中的模型逆向攻防研究综述 王冬, 秦倩倩, 郭开天, 刘容轲, 颜伟鹏, 任一支, 罗清彩, 申延召 通信学报 44 (11), 94-109, 2023 | 1 | 2023 |