default search action
Kerong Ben
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Wang Bin, Ben Kerong, Yixue Hao, Mingjiu Zuo:
SQMCR: Stackelberg Q-Learning-Based Multi-Hop Cooperative Routing Algorithm for Underwater Wireless Sensor Networks. IEEE Access 12: 56179-56195 (2024) - [j10]Feipeng Wang, Kerong Ben, Hu Peng, Meini Yang:
NeighborMix data augmentation for image recognition. Multim. Tools Appl. 83(9): 26581-26598 (2024) - [j9]Bin Wang, Kerong Ben:
GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks. Sensors 24(15): 4879 (2024) - 2023
- [c21]Feipeng Wang, Kerong Ben, Xian Zhang, Meini Yang:
Lightweight Weight Update for Convolutional Neural Networks. BigData 2023: 108-118 - [c20]Gang Wang, Xiao Lv, Kerong Ben, Liangzhong Cui:
A Particle Swarm Optimization Algorithm Based on Experience Pool for Multi-UAV Cooperative Reconnaissance Task Allocation. CSCWD 2023: 861-866 - 2022
- [j8]Lianglin Cao, Kerong Ben, Hu Peng, Xian Zhang:
Enhancing firefly algorithm with adaptive multi-group mechanism. Appl. Intell. 52(9): 9795-9815 (2022) - [j7]Bin Wang, Kerong Ben, Haitao Lin, Mingjiu Zuo, Fengchen Zhang:
EP-ADTA: Edge Prediction-Based Adaptive Data Transfer Algorithm for Underwater Wireless Sensor Networks (UWSNs). Sensors 22(15): 5490 (2022) - [c19]Feifei Wang, Kerong Ben, Xian Zhang:
SR-MT: A Metamorphic Method to Test the Robustness of Speech Recognition Software. MET@ICSE 2022: 15-22 - 2021
- [j6]Lianglin Cao, Kerong Ben, Hu Peng:
Enhancing firefly algorithm with multiple swarm strategy. J. Intell. Fuzzy Syst. 41(1): 99-112 (2021) - 2020
- [c18]Lianglin Cao, Kerong Ben, Hu Peng, Xian Zhang, Feipeng Wang:
An Improved Firefly Algorithm for Software Defect Prediction. NCTCS 2020: 33-46
2010 – 2019
- 2019
- [j5]Jie Zeng, Kerong Ben, Xiaowei Li, Xian Zhang:
Fast Code Clone Detection Based on Weighted Recursive Autoencoders. IEEE Access 7: 125062-125078 (2019) - [j4]Xian Zhang, Kerong Ben:
改进的神经语言模型及其在代码提示中的应用 (Modified Neural Language Model and Its Application in Code Suggestion). 计算机科学 46(11): 168-175 (2019) - 2018
- [c17]Xian Zhang, Kerong Ben, Jie Zeng:
Cross-Entropy: A New Metric for Software Defect Prediction. QRS 2018: 111-122 - 2015
- [j3]Yiwei Lei, Kerong Ben:
基于补偿事务的业务流程异常处理建模研究 (Research on Compensating Transaction Based Business Processes Exception Handling Model). 计算机科学 42(7): 91-94 (2015) - [j2]Di Zheng, Kerong Ben, Jun Wang:
面向复杂物联网应用的上下文质量感知技术研究 (Research of Quality-aware Contexts Management for Complex IOT Applications). 计算机科学 42(12): 152-156 (2015) - [c16]Yiwei Lei, Kerong Ben, Zhiyong He:
A model driven agent-oriented self-adaptive software development method. FSKD 2015: 2242-2246 - 2014
- [c15]Di Zheng, Kerong Ben, Hongliang Yuan:
Research of Big Data Space-Time Analytics for Clouding Based Contexts-Aware IOV Applications. CBD 2014: 150-156 - [c14]Di Zheng, Jun Wang, Ben Kerong:
Research of QoC Based Management for Complex Sensor Networks Applications. DASC 2014: 435-440 - [c13]Di Zheng, Jun Wang, Ben Kerong:
Research of Context-Aware Component Adaptation Model in Pervasive Environment. DASC 2014: 496-501 - 2013
- [j1]Ziying Dai, Xiaoguang Mao, Yan Lei, Xiaomin Wan, Kerong Ben:
Resco: Automatic Collection of Leaked Resources. IEICE Trans. Inf. Syst. 96-D(1): 28-39 (2013) - [c12]Di Zheng, Jun Wang, Ben Kerong:
A QoC Based Method for Reliable Fusion of Uncertain Pervasive Contexts. HPCC/EUC 2013: 2311-2316 - [c11]Di Zheng, Jun Wang, Kerong Ben:
Research of information processing for massive sensors in extended IOV applications. ICCT 2013: 438-443 - 2012
- [c10]Di Zheng, Jun Wang, Ben Kerong:
Evaluation of Quality Measure Factors for the Middleware Based Context-Aware Applications. ACIS-ICIS 2012: 403-408 - [c9]Ziying Dai, Xiaoguang Mao, Yuhua Qi, Kerong Ben:
Light-Weight Test Oracles for Resource Leaks Based on Finalizers. APSEC Workshops 2012: 73-79 - [c8]Di Zheng, Jun Wang, Ke-rong Ben:
Agent Based Quality Management Middleware for Context-Aware Pervasive Applications. GPC 2012: 221-230 - [c7]Di Zheng, Qingwei Xu, Ke-rong Ben:
Research of QoC-aware Service Adaptation in Pervasive Environment. ICIC (1) 2012: 284-292 - 2010
- [c6]Yunfeng Luo, Ben Kerong:
Scenario-Based Early Reliability Model for Distributed Software. FCST 2010: 201-207 - [c5]Yunfeng Luo, Ben Kerong, Lei Mi:
Software Metrics Reduction for Fault-Proneness Prediction of Software Modules. NPC 2010: 432-441
2000 – 2009
- 2008
- [c4]Zhiyong He, Kerong Ben, Zhixiang Zhang:
Software Architectural Reflection Mechanism for Runtime Adaptation. ICYCS 2008: 1101-1105 - [c3]Haimei Zhang, Kerong Ben, Zhixiang Zhang:
A Reflective Architecture-Aware Framework to Support Software Evolution. ICYCS 2008: 1145-1149 - [c2]Zhenxing Yao, Zhixiang Zhang, Kerong Ben:
An Approach to Dynamic Software Updating for Java. PACIIA (2) 2008: 930-934 - 2005
- [c1]Linke Zhang, Lin He, Ben Kerong, Na Wei, Yunfu Pang, Shijian Zhu:
Identification of the Acoustic Fault Sources of Underwater Vehicles Based on Modular Structure Variable RBF Network. ISNN (3) 2005: 567-573
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint