Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Daniel P. Kennedy
Daniel Liu
Barbara Aquilani
Harun Taşkın
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Harindu Korala
Chen Ma
Home
/
Author
/
WENJIA NIU
Author Info
Open Visualization
Name
Affiliation
Papers
WENJIA NIU
Chinese Acad Sci, Inst Acoust, High Performance Network Lab, Beijing 100190, Peoples R China
78
Collaborators
Citations
PageRank
168
178
30.33
Referers
Referees
References
499
1743
753
Search Limit
100
1000
Publications (78 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation
0
0.34
2022
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System
0
0.34
2022
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
0
0.34
2021
Adversarial Retraining Attack Of Asynchronous Advantage Actor-Critic Based Pathfinding
0
0.34
2021
Contiguous Loss For Motion-Based, Non-Aligned Image Deblurring
0
0.34
2021
Towards Revealing Parallel Adversarial Attack On Politician Socialnet Of Graph Structure
0
0.34
2021
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View
0
0.34
2021
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning
0
0.34
2021
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things
1
0.35
2021
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
0
0.34
2021
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack
0
0.34
2020
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples
0
0.34
2020
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.
0
0.34
2020
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
0
0.34
2020
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.
0
0.34
2020
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System
0
0.34
2020
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.
0
0.34
2020
An Empirical Study On Gan-Based Traffic Congestion Attack Analysis: A Visualized Method
0
0.34
2020
Exposing Spoofing Attack On Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat To Swarm Intelligence
0
0.34
2020
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.
0
0.34
2019
Adversarial attack and defense in reinforcement learning-from AI security view.
3
0.49
2019
A Training-based Identification Approach to VIN Adversarial Examples.
0
0.34
2018
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.
0
0.34
2018
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution.
0
0.34
2018
Intention-Aware Multi-channel Keyword Extension for Content Security.
0
0.34
2018
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.
0
0.34
2018
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.
0
0.34
2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
0
0.34
2018
Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.
2
0.37
2017
A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.
0
0.34
2017
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems.
0
0.34
2017
New advances in securing cyberspace and curbing crowdturfing.
1
0.35
2017
Boosting imbalanced data learning with Wiener process oversampling.
3
0.40
2017
A Hidden Astroturfing Detection Approach Base on Emotion Analysis.
0
0.34
2017
Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution.
0
0.34
2017
Curbing collusive cyber-gossips for business brand management
1
0.35
2017
Request routing through collaborative in-network caching for bandwidth optimization: a methodology.
0
0.34
2017
A differentially private algorithm for location data release
9
0.52
2016
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy
1
0.35
2016
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks
3
0.38
2016
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks
2
0.37
2015
Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.
0
0.34
2015
Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation.
16
0.57
2015
Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization
5
0.42
2015
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
9
0.46
2014
A DBN-Based Classifying Approach to Discover the Internet Water Army.
0
0.34
2014
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network
1
0.36
2014
Context-Aware Service Ranking in Wireless Sensor Networks
12
0.57
2014
A novel cache size optimization scheme based on manifold learning in Content Centric Networking
15
0.64
2014
Privacy Preserving In Location Data Release: A Differential Privacy Approach
1
0.35
2014
1
2
50 / page