default search action
Wenjia Niu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j42]Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu:
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 (2024) - [c56]Dianjing Cheng, Xingyu Wu, Zhenghao Xie, Zhihua Cui, Qiong Li, Endong Tong, Wenjia Niu, Ziyi Wei, Xinyi Zhao:
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning. Intelligent Information Processing (2) 2024: 32-45 - [c55]Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. KSEM (3) 2024: 220-232 - [c54]Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. KSEM (3) 2024: 336-348 - [i8]Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
OSS Malicious Package Analysis in the Wild. CoRR abs/2404.04991 (2024) - [i7]Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems. CoRR abs/2404.11467 (2024) - [i6]Haocong Li, Yaxin Zhang, Long Cheng, Wenjia Niu, Haining Wang, Qiang Li:
Obfuscating IoT Device Scanning Activity via Adversarial Example Generation. CoRR abs/2406.11515 (2024) - [i5]Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 (2024) - 2023
- [j41]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - [c53]Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu:
Robust Reinforcement Learning via Progressive Task Sequence. IJCAI 2023: 455-463 - [c52]Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng:
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. ISSREW 2023: 214-221 - [c51]Pengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu:
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration. ML4CS 2023: 74-89 - 2022
- [j40]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j39]Wenjia Niu, Kaihao Zhang, Dongxu Li, Wenhan Luo:
Four-player GroupGAN for weak expression recognition via latent expression magnification. Knowl. Based Syst. 251: 109304 (2022) - [j38]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j37]Endong Tong, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 (2022) - [c50]Di Zhai, Jian Wang, Jiqiang Liu, Tianhao Liu, Wenjia Niu:
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness. ICPADS 2022: 217-225 - [c49]Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - 2021
- [j36]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j35]Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong, Hongdong Li:
Deep robust image deblurring via blur distilling and information comparison in latent space. Neurocomputing 466: 69-79 (2021) - [j34]Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong:
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 (2021) - [j33]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j32]Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - [j31]Wenjia Niu, Kewen Xia, Yongke Pan:
Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring. Symmetry 13(4): 630 (2021) - [j30]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j29]Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong:
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding. IEEE Trans. Image Process. 30: 7101-7111 (2021) - [c48]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - [c47]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c46]Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu:
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) 2021: 368-383 - [c45]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - [i4]Wenjia Niu, Kaihao Zhang, Wenhan Luo, Yiran Zhong, Xin Yu, Hongdong Li:
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding. CoRR abs/2105.13077 (2021) - 2020
- [j28]Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [j27]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c44]Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt 2020: 37-52 - [c43]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c42]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c41]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c40]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328 - [c39]Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131 - [c38]Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - [c37]Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS 2020: 207-221
2010 – 2019
- 2019
- [j26]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [i3]Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li:
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack. CoRR abs/1905.03454 (2019) - 2018
- [j25]Zhiwei Guo, Chaowei Tang, Hui Tang, Yunqing Fu, Wenjia Niu:
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution. IEEE Access 6: 5865-5878 (2018) - [c36]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c35]XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. DSC 2018: 781-787 - [c34]Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:
Intention-Aware Multi-channel Keyword Extension for Content Security. DSC 2018: 788-794 - [c33]Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. DSC 2018: 803-810 - [c32]Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu:
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222 - [i2]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - [i1]Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu:
A Training-based Identification Approach to VIN Adversarial Examples. CoRR abs/1810.08070 (2018) - 2017
- [j24]Zhiwei Guo, Chaowei Tang, Wenjia Niu, Yunqing Fu, Tong Wu, Haiyang Xia, Hui Tang:
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems. IEEE Access 5: 15529-15541 (2017) - [j23]Wenjia Niu, Kewen Xia, Baokai Zu, Jianchuan Bai:
Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation. Comput. Intell. Neurosci. 2017: 3678487:1-3678487:9 (2017) - [j22]Baokai Zu, Kewen Xia, Yongke Pan, Wenjia Niu:
A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph. Comput. Intell. Neurosci. 2017: 9290230:1-9290230:11 (2017) - [j21]Gang Li, Wenjia Niu, Lynn Batten, Jiqiang Liu:
New advances in securing cyberspace and curbing crowdturfing. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j20]Gang Li, Wenjia Niu, Jianlong Tan, Lynn Batten, Liang Chang:
Curbing collusive cyber-gossips for business brand management. Enterp. Inf. Syst. 11(10): 1457-1461 (2017) - [j19]Yuemei Xu, Zihou Wang, Yang Li, Fu Chen, Tao Lin, Wenjia Niu:
Request routing through collaborative in-network caching for bandwidth optimization: a methodology. Trans. Emerg. Telecommun. Technol. 28(1) (2017) - [j18]Qian Li, Gang Li, Wenjia Niu, Yanan Cao, Liang Chang, Jianlong Tan, Li Guo:
Boosting imbalanced data learning with Wiener process oversampling. Frontiers Comput. Sci. 11(5): 836-851 (2017) - [c31]Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han:
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. ICICS 2017: 374-384 - [c30]XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu:
A Cross-Modal CCA-Based Astroturfing Detection Approach. ICICS 2017: 582-592 - [c29]Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, XiaoXuan Bai, Jingjing Liu, Yingxiao Xiang, Tong Wu, Jiqiang Liu:
A Hidden Astroturfing Detection Approach Base on Emotion Analysis. KSEM 2017: 55-66 - [c28]Zhiwei Guo, Chaowei Tang, Wenjia Niu, Yunqing Fu, Haiyang Xia, Hui Tang:
Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution. KSEM 2017: 359-370 - 2016
- [j17]Gang Li, Wenjia Niu, Li Guo, Lynn Margaret Batten, Yinlong Liu, Guoyong Cai:
Securing cyberspace. Concurr. Comput. Pract. Exp. 28(6): 1870-1871 (2016) - [j16]Bo Zhang, Endong Tong, Jie Hao, Wenjia Niu, Gang Li:
Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks. J. Netw. Syst. Manag. 24(4): 834-858 (2016) - [j15]Ping Xiong, Tianqing Zhu, Wenjia Niu, Gang Li:
A differentially private algorithm for location data release. Knowl. Inf. Syst. 47(3): 647-669 (2016) - [j14]Wenjia Niu, Endong Tong, Qian Li, Gang Li, Xuemin Wen, Jianlong Tan, Li Guo:
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy. Knowl. Inf. Syst. 48(1): 111-141 (2016) - [c27]Qian Li, Wenjia Niu, Gang Li, Jianlong Tan, Gang Xiong, Li Guo:
Riemannian optimization with subspace tracking for low-rank recovery. IJCNN 2016: 3280-3287 - 2015
- [j13]Qian Li, Wenjia Niu, Gang Li, Endong Tong, Yue Hu, Ping Liu, Li Guo:
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks. J. Netw. Syst. Manag. 23(3): 474-501 (2015) - [c26]Qian Li, Wenjia Niu, Gang Li, Yanan Cao, Jianlong Tan, Li Guo:
Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization. CIKM 2015: 801-809 - [c25]Cuicui Kang, Shengcai Liao, Yonghao He, Jian Wang, Wenjia Niu, Shiming Xiang, Chunhong Pan:
Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation. CIKM 2015: 1251-1260 - [c24]Yanan Cao, Cungen Cao, Jingzun Zhang, Wenjia Niu:
Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches. KSEM 2015: 588-599 - 2014
- [j12]Gang Li, Wenjia Niu, Lynn Margaret Batten:
Special issue on behavior data security issues in network information propagation. Future Gener. Comput. Syst. 36: 120-121 (2014) - [j11]Wenjia Niu, Gang Li, Endong Tong, Xinghua Yang, Liang Chang, Zhongzhi Shi, Song Ci:
Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization. J. Netw. Comput. Appl. 37: 155-169 (2014) - [j10]Yuemei Xu, Yang Li, Tao Lin, Zihou Wang, Wenjia Niu, Hui Tang, Song Ci:
A novel cache size optimization scheme based on manifold learning in Content Centric Networking. J. Netw. Comput. Appl. 37: 273-281 (2014) - [j9]Endong Tong, Wenjia Niu, Gang Li, Ding Tang, Liang Chang, Zhongzhi Shi, Song Ci:
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 39: 38-51 (2014) - [j8]Wenjia Niu, Gang Li, Endong Tong, Quan Z. Sheng, Qian Li, Yue Hu, Athanasios V. Vasilakos, Li Guo:
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network. J. Netw. Comput. Appl. 44: 120-133 (2014) - [j7]Wenjia Niu, Jun Lei, Endong Tong, Gang Li, Liang Chang, Zhongzhi Shi, Song Ci:
Context-Aware Service Ranking in Wireless Sensor Networks. J. Netw. Syst. Manag. 22(1): 50-74 (2014) - [c23]Zhi Qiao, Peng Zhang, Wenjia Niu, Chuan Zhou, Peng Wang, Li Guo:
Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction. ICDM 2014: 520-529 - [c22]Weiqiang Sun, Weizhong Zhao, Wenjia Niu, Liang Chang:
A DBN-Based Classifying Approach to Discover the Internet Water Army. Intelligent Information Processing 2014: 78-89 - [c21]Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li:
Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI 2014: 183-195 - 2013
- [j6]Yuemei Xu, Wenjia Niu, Hui Tang, Gang Li, Zhijun Zhao, Song Ci:
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks. J. Netw. Syst. Manag. 21(3): 384-407 (2013) - [c20]Benke Qu, Wenjia Niu, Tianqing Zhu, Lei Wu, Shijun Liu, Na Wang:
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks. BSI@PAKDD/BSIC@IJCAI 2013: 44-55 - [c19]Xiancheng Hou, Bing Shi, Wenjia Niu, Qi Feng, Ying Qi:
An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network. BSI@PAKDD/BSIC@IJCAI 2013: 204-213 - 2012
- [j5]Wenjia Niu, Gang Li:
Guest Editorial. J. Networks 7(6): 893-894 (2012) - [c18]Hui Zhao, Wenjia Niu, Yifang Qin, Song Ci, Hui Tang, Tao Lin:
Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network. ACIS-ICIS 2012: 99-104 - [c17]Wenjia Niu, Xinghua Yang, Gang Li, Endong Tong, Hui Tang, Song Ci:
An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance. ADMI 2012: 51-64 - [c16]Jun Lei, Wenjia Niu, Yifang Qin, Hui Tang, Song Ci:
Aggregating user rating and service context for WSN service ranking. GLOBECOM 2012: 5362-5367 - [c15]Yuemei Xu, Yanni Han, Wenjia Niu, Yang Li, Tao Lin, Song Ci:
A Reference Model for Virtual Resource Description and Discovery in Virtual Networks. ICCSA (3) 2012: 297-310 - [c14]Tianlong Yun, Wenjia Niu, Xinghua Yang, Hui Tang, Song Ci:
Frequency-Adaptive Cluster Head Election in Wireless Sensor Network. Intelligent Information Processing 2012: 311-319 - [c13]Endong Tong, Wenjia Niu, Gang Li, Hui Tang, Ding Tang, Song Ci:
Hierarchical Workflow Management in Wireless Sensor Network. PRICAI 2012: 601-612 - 2011
- [j4]Xiaofeng Wang, Kun Yue, Wenjia Niu, Zhongzhi Shi:
An approach for adaptive associative classification. Expert Syst. Appl. 38(9): 11873-11883 (2011) - [j3]Zhongzhi Shi, Wenjia Niu, Zuqiang Meng, Yuan Lu:
Tolerance granular computing towards incomplete information system. Int. J. Granul. Comput. Rough Sets Intell. Syst. 2(1): 10-22 (2011) - [j2]Wenjia Niu, Gang Li, Zhijun Zhao, Hui Tang, Zhongzhi Shi:
Multi-granularity context model for dynamic Web service composition. J. Netw. Comput. Appl. 34(1): 312-326 (2011) - [j1]Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi:
CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition. J. Netw. Comput. Appl. 34(5): 1757-1770 (2011) - [c12]Xiaofeng Wang, Wenjia Niu, Gang Li, Xinghua Yang, Zhongzhi Shi:
Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition. ADMI 2011: 211-227 - [c11]Endong Tong, Wenjia Niu, Hui Tang, Gang Li, Zhijun Zhao:
Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network. ICSOC Workshops 2011: 270-282 - 2010
- [c10]Qiang Shen, Zhijun Zhao, Wenjia Niu, Yu Liu, Hui Tang:
Tolerance-Based Adaptive Online Outlier Detection for Internet of Things. GreenCom/CPSCom 2010: 560-565 - [c9]Wenjia Niu, Quansheng Dou, Xu Han, Xinghua Yang, Zhongzhi Shi:
Multi-agent and Workflow-Based Web Service Management Model. Intelligent Information Processing 2010: 26-34 - [c8]Xu Han, Zhongzhi Shi, Wenjia Niu, Kunrong Chen, Xinghua Yang:
Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services. Web Intelligence 2010: 589-596
2000 – 2009
- 2009
- [c7]Xu Han, Zhongzhi Shi, Wenjia Niu, Fen Lin, Donglei Zhang:
An Approach for Diagnosing Unexpected Faults in Web Service Flows. GCC 2009: 61-66 - [c6]Wenjia Niu, Gang Li, Xinghua Yang, Xu Han, Zhongzhi Shi:
Facilitating dynamic web service composition with fine-granularity context management. GrC 2009: 454-459 - [c5]Hui Peng, Wenjia Niu, Ronghuai Huang:
Similarity Based Semantic Web Service Match. WISM 2009: 252-260 - 2008
- [c4]Hui Peng, Zhongzhi Shi, Liang Chang, Wenjia Niu:
Improving Grade Match to Value Match for Semantic Web Service Discovery. ICNC (5) 2008: 232-236 - [c3]Wenjia Niu, Zhongzhi Shi, Changlin Wan, Liang Chang, Hui Peng:
A DDL-Based Model for Web Service Composition in Context-Aware Environment. ICWS 2008: 787-788 - [c2]Wenjia Niu, Zhongzhi Shi, Liang Chang:
A Context Model for Service Composition Based on Dynamic Description Logic. Intelligent Information Processing 2008: 7-16 - [c1]Wenjia Niu, Zhongzhi Shi, Peng Cao, Hui Peng, Liang Chang:
Semantic Filtering for DDL-Based Service Composition. PRICAI 2008: 778-787
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint