Name
Affiliation
Papers
JIA-DONG REN
Yanshan Univ, Coll Informat Sci & Engn, Qinhuangdao 066004, Peoples R China
30
Collaborators
Citations 
PageRank 
71
36
10.77
Referers 
Referees 
References 
103
397
164
Search Limit
100397
Title
Citations
PageRank
Year
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine00.342022
Maximize Expected Profits by Dynamic After-Sales Service Investment Strategy Based on Word-of-Mouth Marketing in Social Network Shopping00.342021
Low-Rate Ddos Attacks Detection Method Using Data Compression And Behavior Divergence Measurement10.362021
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel10.362021
Deep Sparse Autoencoder Prediction Model Based On Adversarial Learning For Cross-Domain Recommendations00.342021
Enhancing Spectrum-Based Fault Localization Using Fault Influence Propagation20.382020
Software Crucial Functions Ranking And Detection In Dynamic Execution Sequence Patterns00.342020
A Novel Algorithm For Identifying Key Function Nodes In Software Network Based On Evidence Theory00.342019
Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm.00.342019
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning.00.342019
Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace.10.362019
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms.00.342019
An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees.30.412018
Distributed Frequent Interactive Pattern-Based Complex Software Group Network Stability Measurement00.342018
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span00.342017
Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis00.342017
OIM-SM: A method for ontology integration based on semantic mapping.10.362017
New Families Of Binary Sequence Pairs With Three-Level Correlation And Odd Composite Length00.342016
Perfect Gaussian Integer Sequences Of Degree-4 Using Difference Sets00.342016
Mining sequential patterns with periodic wildcard gaps220.682014
Hierarchical K-means clustering algorithm based on silhouette and entropy00.342011
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets00.342009
Software Fault Feature Clustering Algorithm Based on Sequence Pattern00.342009
Sliding-Window Filtering with Constraints of Compactness and Recency in Incremental Database10.352008
Mining Weighted Closed Sequential Patterns in Large Databases20.382008
Sequential Pattern Mining with Inaccurate Event in Temporal Sequence00.342008
Maximal Sequential Pattern Mining Based on Simultaneous Monotone and Anti-monotone Constraints00.342007
MMFI_DSSW: a new method to incrementally mine maximal frequent itemsets in transaction sensitive sliding window00.342007
Index-Based Load Shedding for Streaming Sliding Window Joins00.342007
An efficient algorithm for incremental mining of sequential patterns20.382005