Research on the Rules of Mapping from Relational Model to OWL. G Shen, Z Huang, X Zhu, X Zhao OWLED 216, 2006 | 62 | 2006 |
Dither modulation based adaptive steganography resisting JPEG compression and statistic detection Y Zhang, X Zhu, C Qin, C Yang, X Luo Multimedia Tools and Applications 77, 17913-17935, 2018 | 50 | 2018 |
Detection of data injection attack in industrial control system using long short term memory recurrent neural network W Wang, Y Xie, L Ren, X Zhu, R Chang, Q Yin 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2018 | 27 | 2018 |
Design of a multi-agent based intelligent intrusion detection system X Zhu, Z Huang, H Zhou 2006 First International Symposium on Pervasive Computing and Applications …, 2006 | 26 | 2006 |
Conceptual modeling rules extracting for data streams XD Zhu, ZQ Huang Knowledge-Based Systems 21 (8), 934-940, 2008 | 21 | 2008 |
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes Y Zhang, X Luo, X Zhu, Z Li, AG Bors Journal of Real-Time Image Processing 17 (1), 115-123, 2020 | 20 | 2020 |
Outward FDI and entrepreneurship: The case of China L Shen, P Koveos, X Zhu, F Wen, J Liao Sustainability 12 (13), 5234, 2020 | 16 | 2020 |
Empirical study on factors influencing customers’ intention of Yu Ebao based on TAM/TPB with perceived risk CL Luo, XD Zhu Journal of Modern Information 2, 143-149, 2015 | 14 | 2015 |
Using description logics reasoner for ontology matching G Shen, Z Huang, X Zhu, L Wang, G Xiang Workshop on Intelligent Information Technology Application (IITA 2007), 30-33, 2007 | 13 | 2007 |
基于 TAM/TPB 和感知风险的余额宝使用意愿影响因素实证研究 罗长利, 朱小栋 现代情报 35 (2), 143-149, 2015 | 11 | 2015 |
A technique for bytecode decompilation of PLC program X Lv, Y Xie, X Zhu, L Ren 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation …, 2017 | 10 | 2017 |
Cost-effective big data mining in the cloud: A case study with k-means Q He, X Zhu, D Li, S Wang, J Shen, Y Yang 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 74-81, 2017 | 9 | 2017 |
基于 UTAUT 和 ITM 整合视角的微信支付用户使用行为影响因素研究 陈洁, 朱小栋 现代情报 35 (4), 35-40, 2015 | 9 | 2015 |
A novel approach to identify the mechanism of miR-145-5p toxicity to podocytes based on the essential genes targeting analysis S Zhang, J Wu, X Zhu, H Song, L Ren, Q Tang, X Xu, C Liu, J Zhang, ... Molecular Therapy-Nucleic Acids 26, 749-759, 2021 | 7 | 2021 |
Construction and management of automatical reasoning supported data mining metadata X Zhu, H Wang, H Gan, C Gao 2011 International Conference on Business Management and Electronic …, 2011 | 7 | 2011 |
Fuzzy implication methods in fuzzy logic X Zhu, Z Huang, S Yang, G Shen Fourth International Conference on Fuzzy Systems and Knowledge Discovery …, 2007 | 7 | 2007 |
Fuzzy sets based granular logics for granular computing Y Zhang, X Zhu, Z Huang 2009 International Conference on Computational Intelligence and Software …, 2009 | 6 | 2009 |
Reasoning about web services with dynamic description logics G Shen, Z Huang, X Zhu, J Yang 2009 WRI World Congress on Computer Science and Information Engineering 6 …, 2009 | 6 | 2009 |
A semantic model for matchmaking of web services based on description logics G Shen, Z Huang, Y Zhang, X Zhu, J Yang Fundamenta Informaticae 96 (1-2), 211-226, 2009 | 6 | 2009 |
Description logic based consistency checking upon data mining metadata X Zhu, Z Huang, G Shen International Conference on Rough Sets and Knowledge Technology, 475-482, 2008 | 6 | 2008 |