关注
Huaying Wang
Huaying Wang
BUAA
在 heuet.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Predicting Vulnerable Software Components through Deep Neural Network
Y Pang, X Xue, H Wang
Proceedings of the 2017 International Conference on Deep Learning …, 2017
992017
A clustering-based grouping model for enhancing collaborative learning
Y Pang, F Xiao, H Wang, X Xue
Machine Learning and Applications (ICMLA), 2014 13th International …, 2014
332014
Constructing collaborative learning groups with maximum diversity requirements
Y Pang, R Mugno, X Xue, H Wang
Advanced Learning Technologies (ICALT), 2015 IEEE 15th International …, 2015
102015
A predator–prey interaction from micro to macro perspectives
H Wang, Y Pang, L Zhang, CF Martin
Nonlinear Dynamics 79 (3), 2017-2025, 2015
32015
Analysis of a Holling II System with Frequency-dependent Fitness and Constant Harvesting Rate of Prey
H Wang, H Zhang, Y Sun, Y Pang
12015
Analysis of a Ratio-Dependent Predator-Prey Interaction with Epidemic in the Predator
H Wang, X Li, L Zhang, Y Pang
2014
THE LIMIT CYCLE FOR A CLASS OF THE HIGHER DEGREE POLYNOMIAL SYSTEM AND ITS APPLICATION
H WANG, X WANG
Journal of Systems Science and Mathematical Sciences 12, 010, 2010
2010
一类高次多项式系统的极限环及其对二次系统的应用
王华颖, 王晓霞
系统科学与数学, 1669-1675, 2010
2010
系统目前无法执行此操作,请稍后再试。
文章 1–8