Identifying users across social networks based on dynamic core interests Y Nie, Y Jia, S Li, X Zhu, A Li, B Zhou Neurocomputing 210, 107-115, 2016 | 120 | 2016 |
Attention-based encoder-decoder model for answer selection in question answering Y Nie, Y Han, J Huang, B Jiao, A Li Frontiers of Information Technology & Electronic Engineering 18 (4), 535-544, 2017 | 40 | 2017 |
A multi-attention-based bidirectional long short-term memory network for relation extraction L Li, Y Nie, W Han, J Huang Neural Information Processing: 24th International Conference, ICONIP 2017 …, 2017 | 21 | 2017 |
Accurately and quickly calculating the weighted spectral distribution B Jiao, Y Nie, J Shi, G Lu, Y Zhou, J Du Telecommunication Systems 62, 231-243, 2016 | 19 | 2016 |
A survey of bit-flip attacks on deep neural network and corresponding defense methods C Qian, M Zhang, Y Nie, S Lu, H Cao Electronics 12 (4), 853, 2023 | 18 | 2023 |
Spammer detection on online social networks based on logistic regression X Zhu, Y Nie, S Jin, A Li, Y Jia Web-Age Information Management: WAIM 2015 International Workshops: HENA …, 2015 | 18 | 2015 |
Deception approach to track-to-track radar fusion using noncoherent dual-source jamming B Rao, Z Gu, Y Nie IEEE Access 8, 50843-50858, 2020 | 16 | 2020 |
Identifying users based on behavioral-modeling across social media sites Y Nie, J Huang, A Li, B Zhou Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb …, 2014 | 14 | 2014 |
Scaling of weighted spectral distribution in deterministic scale-free networks B Jiao, Y Nie, J Shi, C Huang, Y Zhou, J Du, R Guo, Y Tao Physica A: Statistical Mechanics and its Applications 451, 632-645, 2016 | 12 | 2016 |
Correlation between weighted spectral distribution and average path length in evolving networks B Jiao, J Shi, X Wu, Y Nie, C Huang, J Du, Y Zhou, R Guo, Y Tao Chaos: An Interdisciplinary Journal of Nonlinear Science 26 (2), 2016 | 12 | 2016 |
Demographic prediction of online social network based on epidemic model X Zhu, Y Nie, A Li Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014 | 12 | 2014 |
Grapheye: A novel solution for detecting vulnerable functions based on graph attention network L Zhou, M Huang, Y Li, Y Nie, J Li, Y Liu 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021 | 10 | 2021 |
Static analysis of source code vulnerability using machine learning techniques: A survey J Wang, M Huang, Y Nie, J Li 2021 4th International Conference on Artificial Intelligence and Big Data …, 2021 | 10 | 2021 |
Detection and tracking of weak exoatmospheric target with elliptical hough transform B Rao, Y Zhou, Y Nie Remote Sensing 14 (3), 491, 2022 | 7 | 2022 |
A hybrid interface recovery method for Android kernels fuzzing S Lu, X Kuang, Y Nie, Z Lin 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 7 | 2020 |
Answer quality assessment in CQA based on similar support sets Z Xie, Y Nie, S Jin, S Li, A Li Chinese Computational Linguistics and Natural Language Processing Based on …, 2015 | 7 | 2015 |
Track-before-detect of weak ballistic target using elliptical Hough transform B Rao, ZW Zong, YP Nie IET Digital Library, 2013 | 7 | 2013 |
A survey on bug deduplication and triage methods from multiple points of view C Qian, M Zhang, Y Nie, S Lu, H Cao Applied Sciences 13 (15), 8788, 2023 | 6 | 2023 |
ICDF: Intrusion collaborative detection framework based on confidence Z Wang, L Shao, K Cheng, Y Liu, J Jiang, Y Nie, X Li, X Kuang International Journal of Intelligent Systems 37 (10), 7180-7199, 2022 | 6 | 2022 |
A bidirectional LSTM model for question title and body analysis in question answering Y Nie, C An, J Huang, Z Yan, Y Han 2016 IEEE First International Conference on Data Science in Cyberspace (DSC …, 2016 | 6 | 2016 |