CSpace

浏览/检索结果: 共5条,第1-5条 帮助

已选(0)清除 条数/页:   排序方式:
BoAu: Malicious traffic detection with noise labels based on boundary augmentation 期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:  Yuan, Qingjun;  Liu, Chang;  Yu, Wentao;  Zhu, Yuefei;  Xiong, Gang;  Wang, Yongjuan;  Gou, Gaopeng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Malicious traffic detection  Deep learning  Learning with noise labels  Decision boundaries  Encrypted traffic  
Truth Discovery by Claim and Source Embedding 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 卷号: 33, 期号: 3, 页码: 1264-1275
作者:  Lyu, Shanshan;  Ouyang, Wentao;  Wang, Yongqing;  Shen, Huawei;  Cheng, Xueqi
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Reliability  Object oriented modeling  Iterative methods  Probabilistic logic  Data science  Computer aided software engineering  Data models  Truth discovery  crowdsourcing  representation learning  
An extravascular fluid transport system based on structural framework of fibrous connective tissues in human body 期刊论文
CELL PROLIFERATION, 2019, 页码: 14
作者:  Li, Hongyi;  Yang, Chongqing;  Yin, Yajun;  Wang, Fang;  Chen, Min;  Xu, Liang;  Wang, Naili;  Zhang, Di;  Wang, Xiaoxia;  Kong, Yiya;  Li, Qing;  Su, Si;  Cao, Yupeng;  Liu, Wentao;  Ao, Zhuo;  Dai, Luru;  Ma, Chao;  Shang, Lijun;  Han, Dong;  Ji, Fusui;  Li, Hua
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
extracellular matrix  fibrous connective tissues  gross anatomy  interfacial transport  interstitial fluid  
In-Place Traceability for Automated Production Systems: A Survey of PLC and SysML Tools 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 卷号: 15, 期号: 6, 页码: 3155-3162
作者:  Wang, Wentao;  Niu, Nan;  Alenazi, Mounifah;  Xu, Li Da
收藏  |  浏览/下载:75/0  |  提交时间:2019/08/16
Automated production systems  development environments  industry 4.0  programming logic controllers (PLC)  systems modeling language (SysML)  traceability  
Automatically Tracing Dependability Requirements via Term-Based Relevance Feedback 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 卷号: 14, 期号: 1, 页码: 342-349
作者:  Wang, Wentao;  Gupta, Arushi;  Niu, Nan;  Da Xu, Li;  Cheng, Jing-Ru C.;  Niu, Zhendong
收藏  |  浏览/下载:59/0  |  提交时间:2019/12/10
Dependability  dependability requirements  privacy  requirements tracing  relevance feedback (RF)  security