关注
Jinyan Wang
Jinyan Wang
Guangxi Normal University
在 gxnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A perturb biogeography based optimization with mutation for global numerical optimization
X Li, J Wang, J Zhou, M Yin
Applied Mathematics and Computation 218 (2), 598-609, 2011
1062011
Two privacy-preserving approaches for publishing transactional data streams
J Wang, C Deng, X Li
IEEE Access 6, 23648-23658, 2018
352018
Fuzzy multiset finite automata and their languages
J Wang, M Yin, W Gu
Soft Computing 17, 381-390, 2013
332013
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu
Journal of Real-Time Image Processing 16, 709-724, 2019
282019
Two privacy-preserving approaches for data publishing with identity reservation
J Wang, K Du, X Luo, X Li
Knowledge and Information Systems 60, 1039-1080, 2019
242019
Soft polygroups
J Wang, M Yin, W Gu
Computers & Mathematics with Applications 62 (9), 3529-3537, 2011
222011
Two approximate algorithms for model counting
J Wang, M Yin, J Wu
Theoretical Computer Science 657, 28-37, 2017
212017
A three-phase approach to differentially private crucial patterns mining over data streams
J Wang, C Liu, X Fu, X Luo, X Li
Computers & Security 82, 30-48, 2019
132019
Differentially private ensemble learning for classification
X Li, J Liu, S Liu, J Wang
Neurocomputing 430, 34-46, 2021
122021
Identifying mutated driver pathways in cancer by integrating multi-omics data
J Wu, Q Cai, J Wang, Y Liao
Computational biology and chemistry 80, 159-167, 2019
122019
Differential privacy preservation in interpretable feedforward-designed convolutional neural networks
J Wang, Z Tan, X Li, Y Hu
2020 IEEE 19th international conference on trust, security and privacy in …, 2020
112020
Phase transitions of EXPSPACE-complete problems: a further step
J Zhou, M Yin, X Li, J Wang
International Journal of Foundations of Computer Science 23 (01), 173-184, 2012
112012
A privacy preservation framework for feedforward-designed convolutional neural networks
D Li, J Wang, Q Li, Y Hu, X Li
Neural Networks 155, 14-27, 2022
92022
A novel watermarking algorithm based on phase congruency corner detection and SVD
W Wang, J Wang, C Wang, D Pu
2010 Fifth International Conference on Frontier of Computer Science and …, 2010
82010
Some new results on soft hypermodules.
J Wang, J Zhan, W Gu
Ars Comb. 104, 289-306, 2012
72012
Differentially private frequent episode mining over event streams
J Qin, J Wang, Q Li, S Fang, X Li, L Lei
Engineering Applications of Artificial Intelligence 110, 104681, 2022
62022
SSGD: A safe and efficient method of gradient descent
J Duan, X Li, S Gao, Z Zhong, J Wang
Security and Communication Networks 2021 (1), 5404061, 2021
62021
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams
J Wang, S Fang, C Liu, J Qin, X Li, Z Shi
Future Generation Computer Systems 111, 339-351, 2020
62020
A model and algorithm for identifying driver pathways based on weighted non-binary mutation matrix
J Wu, K Zhu, G Li, J Wang, Q Cai
Applied Intelligence 52 (1), 127-140, 2022
52022
IDM-SPS: Identifying driver module with somatic mutation, ppi network and subcellular localization
J Wu, J Yang, G Li, J Wang
Engineering Applications of Artificial Intelligence 106, 104482, 2021
52021
系统目前无法执行此操作,请稍后再试。
文章 1–20