Insider Threat Detection Based on User Historical Behavior and Attention Mechanism W He, X Wu, J Wu, X Xie, L Qiu, L Sun 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021 | 5 | 2021 |
Hot event detection for social media based on keyword semantic information Z Yu, X Wu, X Xie, J Xu 2019 IEEE fourth international conference on data science in cyberspace (DSC …, 2019 | 4 | 2019 |
Efficient identity-based offline/online encryption scheme for lightweight devices J Xu, X Wu, X Xie 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 4 | 2018 |
Study and application of semantic-based image retrieval XXIEQBAILHOU Xu WU The Journal of China Universities of Posts and Telecommunications 20 …, 2013 | 4 | 2013 |
An implementation of trusted remote attestation oriented the iaascloud C Li, X Wu, C Liu, X Xie Trustworthy Computing and Services: International Conference, ISCTCS 2012 …, 2013 | 4 | 2013 |
Sensitive image information recognition model of network community based on content text L Gao, X Wu, J Wu, X Xie, L Qiu, L Sun 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021 | 3 | 2021 |
Chinese open relation extraction with pointer-generator networks Z Cheng, X Wu, X Xie, J Wu 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC …, 2020 | 3 | 2020 |
Short text topic recognition and optimization method for university online community X Wu, H Wu, X Xie, J Xu, T Zhang Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019 | 3 | 2019 |
Study of test classification algorithm based on domain knowledge Y Gao, F Song, X Xie, Q Sun, X Wu IET Digital Library, 2015 | 3 | 2015 |
面向机构知识库结构化数据的文本相似度评价算法 吴旭, 郭芳毓, 颉夏青, 许晋 信息网络安全, 16-20, 2015 | 3 | 2015 |
Construction and implementation of ‘classic reading’innovation platform WU Xu, XU Jin, X XIE, X GAO The Journal of China Universities of Posts and Telecommunications 20, 128-135, 2013 | 3 | 2013 |
A universal neuronal classification and naming scheme based on the neuronal morphology L Chunwen, X Xiaqing, W Xu Proceedings of 2011 International Conference on Computer Science and Network …, 2011 | 3 | 2011 |
A method of document sensitivity calculation based on semantic dependency analysis L Gang, W Xu, X Xia-qing 2019 IEEE 8th Joint International Information Technology and Artificial …, 2019 | 2 | 2019 |
An improved multi-classification algorithm for imbalanced online public opinion data X Dang, X Wu, X Xie, T Zhang Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019 | 2 | 2019 |
The design and implementation of APK eBooks online generation system based on FBReader X Wu, J Shi, X Xie Trustworthy Computing and Services: International Conference, ISCTCS 2014 …, 2015 | 2 | 2015 |
Research and implementation of a role-based trustworthiness mechanism for IaaS X Wu, X Xie, C Li 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012 | 2 | 2012 |
DSANE: A Dual Structure-Aware Network Embedding Approach for User Identity Linkage Z Xiong, X Xie, X Wu, Y Peng, Y Lu 2023 IEEE 8th International Conference on Big Data Analytics (ICBDA), 193-198, 2023 | 1 | 2023 |
Adversarial Residual Variational Graph Autoencoder with Batch Normalization Q Liao, X Wu, X Xie, J Wu, L Qiu, L Sun 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021 | 1 | 2021 |
A topic mining method for multi-source network public opinion based on improved hierarchical clustering Y Cai, X Wu, X Xie, J Xu 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019 | 1 | 2019 |
Hybrid text topic discovery method for multi-source information X Wang, X Wu, X Xie, J Xu 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019 | 1 | 2019 |