Nonlinearity model identification for main steam valves based on steady-state data. | 0 | 0.34 | 2021 |
Variable time delay estimation between time series based on significant change points. | 0 | 0.34 | 2021 |
Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors. | 0 | 0.34 | 2020 |
Examining Individuals' Ads Click Intention in the Wechat Moments - A Lens of Elaboration Likelihood Model. | 0 | 0.34 | 2019 |
Conditional Proxy Broadcast Re-Encryption With Fine Grain Policy For Cloud Data Sharing | 0 | 0.34 | 2019 |
On Industrial Alarm Deadbands for Univariate Analog Signals. | 0 | 0.34 | 2019 |
A proxy broadcast re-encryption for cloud data sharing. | 0 | 0.34 | 2018 |
Evolutionary under-sampling based bagging ensemble method for imbalanced data classification. | 5 | 0.43 | 2018 |
Privacy preserving cloud data sharing system with flexible control. | 0 | 0.34 | 2018 |
Identity-based conditional proxy re-encryption with fine grain policy. | 5 | 0.45 | 2017 |
How does web-based virtual reality affect learning: evidences from a quasi-experiment. | 0 | 0.34 | 2017 |
An efficient semi-supervised representatives feature selection algorithm based on information theory. | 13 | 0.56 | 2017 |
Margin distribution explanation on metric learning for nearest neighbor classification. | 2 | 0.35 | 2016 |
一种基于中介真值程度度量的模糊综合评价方法 (Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree). | 0 | 0.34 | 2016 |
A robust multi-class AdaBoost algorithm for mislabeled noisy data. | 13 | 0.54 | 2016 |
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. | 7 | 0.47 | 2016 |
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model). | 0 | 0.34 | 2015 |
Semi-Supervised Local Fisher Discriminant Analysis Based On Reconstruction Probability Class | 2 | 0.41 | 2015 |
An empirical margin explanation for the effectiveness of DECORATE ensemble learning algorithm. | 8 | 0.45 | 2015 |
An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR. | 0 | 0.34 | 2015 |
Bagging-like metric learning for support vector regression. | 7 | 0.45 | 2014 |
An FAR-SW based approach for webpage information extraction | 5 | 0.51 | 2014 |
Current Attitude Prediction Model Based On Game Theory | 0 | 0.34 | 2013 |
A sock puppet detection algorithm on virtual spaces | 17 | 0.75 | 2013 |
Public key encryption with keyword search secure against keyword guessing attacks without random oracle | 57 | 1.61 | 2013 |
Fuzzy conditional proxy re-encryption | 6 | 0.46 | 2013 |
A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network | 22 | 0.86 | 2013 |
Hierarchical conditional proxy re-encryption | 8 | 0.49 | 2012 |
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search | 17 | 0.68 | 2012 |
Research on the Dynamic Data-driven Application System Architecture for Flight Delay Prediction. | 3 | 0.45 | 2012 |
Local margin based semi-supervised discriminant embedding for visual recognition | 13 | 0.58 | 2011 |
Interactive conditional proxy re-encryption with fine grain policy | 11 | 0.55 | 2011 |
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes | 2 | 0.38 | 2010 |
Decryptable Public Key Encryption with Keyword Search Schemes | 5 | 0.49 | 2010 |
Improved unidirectional chosen-ciphertext secure proxy re-encryption. | 0 | 0.34 | 2010 |
Anonymous Conditional Proxy Re-encryption without Random Oracle | 30 | 1.00 | 2009 |
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle | 30 | 1.21 | 2009 |
Formal proof of relative strength of security among ECK2007 model and other proof models for key agreement protocols | 4 | 0.49 | 2008 |
Weighted Margin Multi-Class Core Vector Machines | 0 | 0.34 | 2008 |
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. | 0 | 0.34 | 2008 |
A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning | 5 | 0.44 | 2008 |
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM | 1 | 0.36 | 2008 |
On-Line Off-Line Ranking Support Vector Machine And Analysis | 1 | 0.63 | 2008 |
An integrated approach for mining meta-rules | 2 | 0.41 | 2005 |
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts | 1 | 0.41 | 1991 |