A perturb biogeography based optimization with mutation for global numerical optimization X Li, J Wang, J Zhou, M Yin Applied Mathematics and Computation 218 (2), 598-609, 2011 | 106 | 2011 |
Two privacy-preserving approaches for publishing transactional data streams J Wang, C Deng, X Li IEEE Access 6, 23648-23658, 2018 | 35 | 2018 |
Fuzzy multiset finite automata and their languages J Wang, M Yin, W Gu Soft Computing 17, 381-390, 2013 | 33 | 2013 |
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu Journal of Real-Time Image Processing 16, 709-724, 2019 | 28 | 2019 |
Two privacy-preserving approaches for data publishing with identity reservation J Wang, K Du, X Luo, X Li Knowledge and Information Systems 60, 1039-1080, 2019 | 24 | 2019 |
Soft polygroups J Wang, M Yin, W Gu Computers & Mathematics with Applications 62 (9), 3529-3537, 2011 | 22 | 2011 |
Two approximate algorithms for model counting J Wang, M Yin, J Wu Theoretical Computer Science 657, 28-37, 2017 | 21 | 2017 |
A three-phase approach to differentially private crucial patterns mining over data streams J Wang, C Liu, X Fu, X Luo, X Li Computers & Security 82, 30-48, 2019 | 13 | 2019 |
Differentially private ensemble learning for classification X Li, J Liu, S Liu, J Wang Neurocomputing 430, 34-46, 2021 | 12 | 2021 |
Identifying mutated driver pathways in cancer by integrating multi-omics data J Wu, Q Cai, J Wang, Y Liao Computational biology and chemistry 80, 159-167, 2019 | 12 | 2019 |
Differential privacy preservation in interpretable feedforward-designed convolutional neural networks J Wang, Z Tan, X Li, Y Hu 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 11 | 2020 |
Phase transitions of EXPSPACE-complete problems: a further step J Zhou, M Yin, X Li, J Wang International Journal of Foundations of Computer Science 23 (01), 173-184, 2012 | 11 | 2012 |
A privacy preservation framework for feedforward-designed convolutional neural networks D Li, J Wang, Q Li, Y Hu, X Li Neural Networks 155, 14-27, 2022 | 9 | 2022 |
A novel watermarking algorithm based on phase congruency corner detection and SVD W Wang, J Wang, C Wang, D Pu 2010 Fifth International Conference on Frontier of Computer Science and …, 2010 | 8 | 2010 |
Some new results on soft hypermodules. J Wang, J Zhan, W Gu Ars Comb. 104, 289-306, 2012 | 7 | 2012 |
Differentially private frequent episode mining over event streams J Qin, J Wang, Q Li, S Fang, X Li, L Lei Engineering Applications of Artificial Intelligence 110, 104681, 2022 | 6 | 2022 |
SSGD: A safe and efficient method of gradient descent J Duan, X Li, S Gao, Z Zhong, J Wang Security and Communication Networks 2021 (1), 5404061, 2021 | 6 | 2021 |
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams J Wang, S Fang, C Liu, J Qin, X Li, Z Shi Future Generation Computer Systems 111, 339-351, 2020 | 6 | 2020 |
A model and algorithm for identifying driver pathways based on weighted non-binary mutation matrix J Wu, K Zhu, G Li, J Wang, Q Cai Applied Intelligence 52 (1), 127-140, 2022 | 5 | 2022 |
IDM-SPS: Identifying driver module with somatic mutation, ppi network and subcellular localization J Wu, J Yang, G Li, J Wang Engineering Applications of Artificial Intelligence 106, 104482, 2021 | 5 | 2021 |