default search action
Qian Wang 0009
Person information
- affiliation: Yanshan University, College of Information Science and Engineering, Qianhuangdao, China
- affiliation: Computer Virtual Technology and System Integration Laboratory of Hebei Province, China
- affiliation: University of Hull, Department of Computer Science, UK
Other persons with the same name
- Qian Wang — disambiguation page
- Qian Wang 0001 — ShanghaiTech University, School of Biomedical Engineering, State Key Laboratory of Advanced Medical Materials and Devices, Shanghai, China (and 3 more)
- Qian Wang 0002 — Wuhan University, School of Cyber Science and Engineering, Hubei, China (and 2 more)
- Qian Wang 0003 — Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX, USA
- Qian Wang 0004 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Qian Wang 0005 — Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qian Wang 0006 — University of South Carolina, Department of Chemistry and Biochemistry, Columbia, SC, USA
- Qian Wang 0007 — The Hong Kong University of Science and Technology, Department of Civil and Environmental Engineering, Hong Kong (and 1 more)
- Qian Wang 0008 — University of Alberta, Edmonton, AB, Canada
- Qian Wang 0010 — Clemson University, International Center for Automotive Research, Applied Dynamics and Control Group, Greenville, SC, USA
- Qian Wang 0011 — Southeast University, School of Computer Science and Engineering, MOE, Key Laboratory of Computer Network and Information Integration, Nanjing, China
- Qian Wang 0012 — Hangzhou Dianzi University, Institute of Information and Control, China (and 1 more)
- Qian Wang 0013 — Information Science and Technology Institute, Zhengzhou, China
- Qian Wang 0014 — Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China (and 2 more)
- Qian Wang 0015 — Beijing University of Posts and Telecommunications, Network Management Center, China
- Qian Wang 0016 — Aalborg University, Department of Energy Technology, Denmark (and 1 more)
- Qian Wang 0017 — Durham University, UK (and 1 more)
- Qian Wang 0018 — University of Bath, Department of Mechanical Engineering, UK (and 1 more)
- Qian Wang 0019 — Xi'an University of Posts and Telecommunications, School of Telecommunication and Information Engineering, China (and 3 more)
- Qian Wang 0020 — Harbin Institute of Technology, School of Mechatronics Engineering, China
- Qian Wang 0021 — EPFL, Computational Mathematics and Simulation Science, Lausanne, Switzerland (and 1 more)
- Qian Wang 0022 — University of Maryland, College Park, USA (and 1 more)
- Qian Wang 0023 — Zhengzhou University of Light Industry, Zhengzhou, China
- Qian Wang 0024 — University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
- Qian Wang 0025 — Peking University, School of Computer Science, China
- Qian Wang 0026 — Xi'an University of Architecture and Technology, School of Management, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Qian Wang, Haiyang Jiang, Jiadong Ren, Han Liu, Xuehang Wang, Bing Zhang:
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network. Expert Syst. Appl. 244: 123014 (2024) - [j21]Bing Zhang, Hongchang Zhang, Rong Ren, Zhen Wen, Qian Wang:
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm. Int. J. Softw. Eng. Knowl. Eng. 34(7): 1173-1197 (2024) - 2023
- [j20]Qian Wang, Yuying Gao, Jiadong Ren, Bing Zhang:
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Comput. Secur. 126: 103070 (2023) - [j19]Jiadong Ren, Mingyou Wu, Bing Zhang, Ke Xu, Shangyang Li, Qian Wang, Yue Chang, Tao Cheng:
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation. Int. J. Softw. Eng. Knowl. Eng. 33(9): 1327-1354 (2023) - [j18]Zhangqi Zheng, Yongshan Liu, Bing Zhang, Jiadong Ren, Yongsheng Zong, Qian Wang, Xiaolei Yang, Qian Liu:
Software defect prediction method based on the heterogeneous integration algorithm. J. Intell. Fuzzy Syst. 45(3): 4807-4824 (2023) - 2022
- [j17]Zhangqi Zheng, Bing Zhang, Yongshan Liu, Jiadong Ren, Xuyang Zhao, Qian Wang:
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm. Comput. Secur. 114: 102572 (2022) - [j16]Qian Wang, Wenfang Zhao, Xiaoyu Wei, Jiadong Ren, Yuying Gao, Bing Zhang:
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine. Int. J. Softw. Eng. Knowl. Eng. 32(8): 1229-1245 (2022) - [j15]Bing Zhang, Yuan Gao, Jingyi Wu, Ning Wang, Qian Wang, Jiadong Ren:
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning. Int. J. Softw. Eng. Knowl. Eng. 32(10): 1559-1582 (2022) - [j14]Qian Wang, Yazhou Li, Yan Wang, Jiadong Ren:
An automatic algorithm for software vulnerability classification based on CNN and GRU. Multim. Tools Appl. 81(5): 7103-7124 (2022) - [c4]Qian Wang, Jiadong Ren, Honghao Zhang, Yu Wang, Bing Zhang:
Identifying Influential Spreaders in Complex Networks Based on Degree Centrality. WISA 2022: 314-326 - 2021
- [j13]Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Chen Song:
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement. Comput. Secur. 100: 102107 (2021) - [j12]Qian Wang, Wenfang Zhao, Jiadong Ren:
Intrusion detection algorithm based on image enhanced convolutional neural network. J. Intell. Fuzzy Syst. 41(1): 2183-2194 (2021) - 2020
- [j11]Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Shengting Sun:
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition. KSII Trans. Internet Inf. Syst. 14(7): 3093-3115 (2020)
2010 – 2019
- 2019
- [j10]Guyu Zhao, Guoyan Huang, Hongdou He, Qian Wang:
Innovative Spatial-Temporal Network Modeling and Analysis Method of Air Quality. IEEE Access 7: 26241-26254 (2019) - [j9]Guoyan Huang, Yazhou Li, Qian Wang, Jiadong Ren, Yongqiang Cheng, Xiaolin Zhao:
Automatic Classification Method for Software Vulnerability Based on Deep Neural Network. IEEE Access 7: 28291-28298 (2019) - [j8]Qian Wang, Weijia Cao, Jiawei Guo, Jiadong Ren, Yongqiang Cheng, Darryl N. Davis:
DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values. IEEE Access 7: 102232-102238 (2019) - [j7]Haitao He, Xu Zhang, Qian Wang, Jiadong Ren, Jiaxin Liu, Xiaolin Zhao, Yongqiang Cheng:
Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data. IEEE Access 7: 110333-110343 (2019) - [j6]Qian Wang, Chun Shan, Xiaolin Zhao, Jun Dong, Jiadong Ren, Jiaxin Liu:
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory. Int. J. Softw. Eng. Knowl. Eng. 29(3): 415-432 (2019) - [j5]Jiadong Ren, Jiawei Guo, Qian Wang, Yuan Huang, Hao Xiaobing, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. Secur. Commun. Networks 2019: 7130868:1-7130868:11 (2019) - [j4]Guoyan Huang, Qian Wang, Xinqian Liu, Xiaobing Hao, Huaizhi Yan:
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. Secur. Commun. Networks 2019: 7140480:1-7140480:11 (2019) - [c3]Jiadong Ren, Qian Wang, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao:
Mining important nodes in complex software network based on ripple effects of probability. ACM TUR-C 2019: 51:1-51:8 - 2018
- [j3]Qian Wang, Jiadong Ren, Yu Wang, Bing Zhang, Yongqiang Cheng, Xiaolin Zhao:
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network. IEEE Access 6: 19550-19559 (2018) - [j2]Qian Wang, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. Secur. Commun. Networks 2018: 5716878:1-5716878:10 (2018) - 2017
- [c2]Wenzhe Liao, Qian Wang, Luqun Yang, Jiadong Ren, Darryl N. Davis, Changzhen Hu:
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span. WISA 2017: 56-61 - [c1]Wenzhe Liao, Qian Wang, Yu Wang, Jiadong Ren, Yongqiang Cheng, Changzhen Hu:
Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis. WISA 2017: 62-67 - 2016
- [j1]Qian Wang, Darryl N. Davis, Jiadong Ren:
Mining frequent biological sequences based on bitmap without candidate sequence generation. Comput. Biol. Medicine 69: 152-157 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint