关注
Xiaodong Zhu
标题
引用次数
引用次数
年份
Research on the Rules of Mapping from Relational Model to OWL.
G Shen, Z Huang, X Zhu, X Zhao
OWLED 216, 2006
622006
Dither modulation based adaptive steganography resisting JPEG compression and statistic detection
Y Zhang, X Zhu, C Qin, C Yang, X Luo
Multimedia Tools and Applications 77, 17913-17935, 2018
502018
Detection of data injection attack in industrial control system using long short term memory recurrent neural network
W Wang, Y Xie, L Ren, X Zhu, R Chang, Q Yin
2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2018
272018
Design of a multi-agent based intelligent intrusion detection system
X Zhu, Z Huang, H Zhou
2006 First International Symposium on Pervasive Computing and Applications …, 2006
262006
Conceptual modeling rules extracting for data streams
XD Zhu, ZQ Huang
Knowledge-Based Systems 21 (8), 934-940, 2008
212008
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes
Y Zhang, X Luo, X Zhu, Z Li, AG Bors
Journal of Real-Time Image Processing 17 (1), 115-123, 2020
202020
Outward FDI and entrepreneurship: The case of China
L Shen, P Koveos, X Zhu, F Wen, J Liao
Sustainability 12 (13), 5234, 2020
162020
Empirical study on factors influencing customers’ intention of Yu Ebao based on TAM/TPB with perceived risk
CL Luo, XD Zhu
Journal of Modern Information 2, 143-149, 2015
142015
Using description logics reasoner for ontology matching
G Shen, Z Huang, X Zhu, L Wang, G Xiang
Workshop on Intelligent Information Technology Application (IITA 2007), 30-33, 2007
132007
基于 TAM/TPB 和感知风险的余额宝使用意愿影响因素实证研究
罗长利, 朱小栋
现代情报 35 (2), 143-149, 2015
112015
A technique for bytecode decompilation of PLC program
X Lv, Y Xie, X Zhu, L Ren
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation …, 2017
102017
Cost-effective big data mining in the cloud: A case study with k-means
Q He, X Zhu, D Li, S Wang, J Shen, Y Yang
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 74-81, 2017
92017
基于 UTAUT 和 ITM 整合视角的微信支付用户使用行为影响因素研究
陈洁, 朱小栋
现代情报 35 (4), 35-40, 2015
92015
A novel approach to identify the mechanism of miR-145-5p toxicity to podocytes based on the essential genes targeting analysis
S Zhang, J Wu, X Zhu, H Song, L Ren, Q Tang, X Xu, C Liu, J Zhang, ...
Molecular Therapy-Nucleic Acids 26, 749-759, 2021
72021
Construction and management of automatical reasoning supported data mining metadata
X Zhu, H Wang, H Gan, C Gao
2011 International Conference on Business Management and Electronic …, 2011
72011
Fuzzy implication methods in fuzzy logic
X Zhu, Z Huang, S Yang, G Shen
Fourth International Conference on Fuzzy Systems and Knowledge Discovery …, 2007
72007
Fuzzy sets based granular logics for granular computing
Y Zhang, X Zhu, Z Huang
2009 International Conference on Computational Intelligence and Software …, 2009
62009
Reasoning about web services with dynamic description logics
G Shen, Z Huang, X Zhu, J Yang
2009 WRI World Congress on Computer Science and Information Engineering 6 …, 2009
62009
A semantic model for matchmaking of web services based on description logics
G Shen, Z Huang, Y Zhang, X Zhu, J Yang
Fundamenta Informaticae 96 (1-2), 211-226, 2009
62009
Description logic based consistency checking upon data mining metadata
X Zhu, Z Huang, G Shen
International Conference on Rough Sets and Knowledge Technology, 475-482, 2008
62008
系统目前无法执行此操作,请稍后再试。
文章 1–20