PM2. 5 concentration forecasting at surface monitoring sites using GRU neural network based on empirical mode decomposition G Huang, X Li, B Zhang, J Ren Science of the Total Environment 768, 144516, 2021 | 216 | 2021 |
Health data driven on continuous blood pressure prediction based on gradient boosting decision tree algorithm B Zhang, J Ren, Y Cheng, B Wang, Z Wei Ieee Access 7, 32423-32433, 2019 | 79 | 2019 |
An empirical study on predicting blood pressure using classification and regression trees B Zhang, Z Wei, J Ren, Y Cheng, Z Zheng IEEE access 6, 21758-21768, 2018 | 79 | 2018 |
Network intrusion detection method based on PCA and Bayes algorithm B Zhang, Z Liu, Y Jia, J Ren, X Zhao Security and Communication Networks 2018 (1), 1914980, 2018 | 73 | 2018 |
Predicting blood pressure from physiological index data using the SVR algorithm B Zhang, H Ren, G Huang, Y Cheng, C Hu BMC bioinformatics 20, 1-15, 2019 | 47 | 2019 |
Efficiency and effectiveness of web application vulnerability detection approaches: A review B Zhang, J Li, J Ren, G Huang ACM Computing Surveys (CSUR) 54 (9), 1-35, 2021 | 30 | 2021 |
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel X Liu, J Ren, H He, B Zhang, C Song, Y Wang Journal of Network and Computer Applications 185, 103079, 2021 | 20 | 2021 |
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network Q Wang, Y Gao, J Ren, B Zhang Computers & Security 126, 103070, 2023 | 19 | 2023 |
CDA: A clustering degree based influential spreader identification algorithm in weighted complex network Q Wang, J Ren, Y Wang, B Zhang, Y Cheng, X Zhao IEEE Access 6, 19550-19559, 2018 | 18 | 2018 |
An algorithm to find critical execution paths of software based on complex network G Huang, B Zhang, R Ren, J Ren International Journal of Modern Physics C 26 (09), 1550101, 2015 | 13 | 2015 |
The optimal community detection of software based on complex networks G Huang, P Zhang, B Zhang, T Yin, J Ren International Journal of Modern Physics C 27 (08), 1650085, 2016 | 11 | 2016 |
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network Q Wang, H Jiang, J Ren, H Liu, X Wang, B Zhang Expert Systems with Applications 244, 123014, 2024 | 6 | 2024 |
Approach to mine the modularity of software network based on the most vital nodes B Zhang, G Huang, Z Zheng, J Ren, C Hu IEEE Access 6, 32543-32553, 2018 | 6 | 2018 |
Approach to mine influential functions based on software execution sequence B Zhang, G Huang, H He, J Ren IET Software 11 (2), 48-54, 2017 | 6 | 2017 |
Spatially structured exchange of metabolites enhances bacterial survival and resilience in biofilms Y Zhang, Y Cai, B Zhang, YHPJ Zhang Nature Communications 15 (1), 7575, 2024 | 5 | 2024 |
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning B Zhang, Y Gao, J Wu, N Wang, Q Wang, J Ren International Journal of Software Engineering and Knowledge Engineering 32 …, 2022 | 5 | 2022 |
A classification method of arrhythmia based on adaboost algorithm B Zhang, J Wen, H Ren Journal of Physics: Conference Series 1682 (1), 012060, 2020 | 5 | 2020 |
SQLPsdem: A Proxy-based Mechanism towards Detecting, Locating and Preventing Second-Order SQL Injections B Zhang, R Ren, J Liu, M Jiang, J Ren, J Li IEEE Transactions on Software Engineering, 2024 | 4 | 2024 |
Intrusion detection algorithm based on convolutional neural network and light gradient boosting machine Q Wang, W Zhao, X Wei, J Ren, Y Gao, B Zhang International Journal of Software Engineering and Knowledge Engineering 32 …, 2022 | 4 | 2022 |
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm Z Zheng, B Zhang, Y Liu, J Ren, X Zhao, Q Wang Computers & Security 114, 102572, 2022 | 4 | 2022 |