Остановите войну!
for scientists:
default search action
Wenjia Niu
- > Home > Persons > Wenjia Niu
Publications
- 2021
- [j36]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j33]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j32]Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - 2020
- [j28]Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [c43]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c38]Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - 2017
- [j20]Gang Li, Wenjia Niu, Jianlong Tan, Lynn Batten, Liang Chang:
Curbing collusive cyber-gossips for business brand management. Enterp. Inf. Syst. 11(10): 1457-1461 (2017) - [j18]Qian Li, Gang Li, Wenjia Niu, Yanan Cao, Liang Chang, Jianlong Tan, Li Guo:
Boosting imbalanced data learning with Wiener process oversampling. Frontiers Comput. Sci. 11(5): 836-851 (2017) - 2014
- [j11]Wenjia Niu, Gang Li, Endong Tong, Xinghua Yang, Liang Chang, Zhongzhi Shi, Song Ci:
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization. J. Netw. Comput. Appl. 37: 155-169 (2014) - [j9]Endong Tong, Wenjia Niu, Gang Li, Ding Tang, Liang Chang, Zhongzhi Shi, Song Ci:
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 39: 38-51 (2014) - [j7]Wenjia Niu, Jun Lei, Endong Tong, Gang Li, Liang Chang, Zhongzhi Shi, Song Ci:
Context-Aware Service Ranking in Wireless Sensor Networks. J. Netw. Syst. Manag. 22(1): 50-74 (2014) - [c22]Weiqiang Sun, Weizhong Zhao, Wenjia Niu, Liang Chang:
A DBN-Based Classifying Approach to Discover the Internet Water Army. Intelligent Information Processing 2014: 78-89 - 2008
- [c4]Hui Peng, Zhongzhi Shi, Liang Chang, Wenjia Niu:
Improving Grade Match to Value Match for Semantic Web Service Discovery. ICNC (5) 2008: 232-236 - [c3]Wenjia Niu, Zhongzhi Shi, Changlin Wan, Liang Chang, Hui Peng:
A DDL-Based Model for Web Service Composition in Context-Aware Environment. ICWS 2008: 787-788 - [c2]Wenjia Niu, Zhongzhi Shi, Liang Chang:
A Context Model for Service Composition Based on Dynamic Description Logic. Intelligent Information Processing 2008: 7-16 - [c1]Wenjia Niu, Zhongzhi Shi, Peng Cao, Hui Peng, Liang Chang:
Semantic Filtering for DDL-Based Service Composition. PRICAI 2008: 778-787
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint