Name
Papers
Collaborators
CHEN LIU
31
80
Citations 
PageRank 
Referers 
29
11.46
90
Referees 
References 
335
121
Search Limit
100335
Title
Citations
PageRank
Year
Ability-Based Asymmetrical Fitness Calculation Promotes Cooperation In Spatial Prisoner'S Dilemma Game00.342022
Segmentation with Residual Attention U-Net and an Edge-Enhancement Approach Preserves Cell Shape Features.00.342022
Matching the Medical Demand in the Context of Online Medical Consultation Data.00.342021
Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment.00.342021
Detect Geographical Location By Multi-View Scene Matching00.342020
Using Discriminative Methods to Learn Fashion Compatibility Across Datasets.00.342019
An Improved Prediction Model for the Network Security Situation.00.342019
PPIDS - A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework.00.342019
Parsimonious Deep Learning: A Differential Inclusion Approach with Global Convergence.00.342019
Frequent Subtree Mining Algorithm for Ribonucleic Acid Topological Pattern.00.342019
MASC: Multi-scale Affinity with Sparse Convolution for 3D Instance Segmentation.50.392019
Exploring Multilingual Syntactic Sentence Representations.00.342019
L_1 -Regularized Continuous Conditional Random Fields.00.342016
From Attention to Citation, What and How Does Altmetrics Work?30.512014
Topologic and dynamic resilience model of Chinese airport network00.342014
"I Know U" - A Proposed VUI Design for Improving User Experience in HRI.10.392013
Games and Culture: Using Online-gaming Data to Cluster Chinese Regional Cultures.00.342013
Using Hardware Acceleration to Improve the Security of Wi-Fi Client Devices.00.342013
The WSN Real-Time Monitoring System for Agricultural Products Cold-Chain Logistics.10.362013
Workload characterization of cryptography algorithms for hardware acceleration (abstracts only)00.342011
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security00.342010
On Better Performance from Scheduling Threads According to Resource Demands in MMMP40.452010
A Hybrid Method for XML Clustering10.352010
A Real-time Interactive Tool for Image Cutout.00.342009
Automatic Generation of Host-Based Network Attack Graph10.342009
An Approach to Discover Dependencies between Service Operations30.402008
A DBOASTBC-OFDM system for wireless communications00.342008
A Programmable Frequency Divider in 0.18µm CMOS Library10.352008
Reifying Control of Multi-Owned Network Resources10.372007
"Service Hyperlink" for Exploratory Service Composition30.572007
An automated linguistic knowledge-based cross-language transfer method for building acoustic models for a language without native training data50.542005