Predicting Vulnerable Software Components through Deep Neural Network Y Pang, X Xue, H Wang Proceedings of the 2017 International Conference on Deep Learning …, 2017 | 99 | 2017 |
A clustering-based grouping model for enhancing collaborative learning Y Pang, F Xiao, H Wang, X Xue Machine Learning and Applications (ICMLA), 2014 13th International …, 2014 | 33 | 2014 |
Constructing collaborative learning groups with maximum diversity requirements Y Pang, R Mugno, X Xue, H Wang Advanced Learning Technologies (ICALT), 2015 IEEE 15th International …, 2015 | 10 | 2015 |
A predator–prey interaction from micro to macro perspectives H Wang, Y Pang, L Zhang, CF Martin Nonlinear Dynamics 79 (3), 2017-2025, 2015 | 3 | 2015 |
Analysis of a Holling II System with Frequency-dependent Fitness and Constant Harvesting Rate of Prey H Wang, H Zhang, Y Sun, Y Pang | 1 | 2015 |
Analysis of a Ratio-Dependent Predator-Prey Interaction with Epidemic in the Predator H Wang, X Li, L Zhang, Y Pang | | 2014 |
THE LIMIT CYCLE FOR A CLASS OF THE HIGHER DEGREE POLYNOMIAL SYSTEM AND ITS APPLICATION H WANG, X WANG Journal of Systems Science and Mathematical Sciences 12, 010, 2010 | | 2010 |
一类高次多项式系统的极限环及其对二次系统的应用 王华颖, 王晓霞 系统科学与数学, 1669-1675, 2010 | | 2010 |