Zobrazeno 1 - 10
of 90
pro vyhledávání: '"YingLe Li"'
Publikováno v:
Axioms, Vol 13, Iss 6, p 387 (2024)
Graph anomaly detection aims to identify unusual patterns or structures in graph-structured data. Most existing research focuses on anomalous nodes in ordinary graphs with pairwise relationships. However, complex real-world systems often involve rela
Externí odkaz:
https://doaj.org/article/e423f0c790da47ef8937e540c0429185
Autor:
XiaoQing Cheng, Jia Liu, HongXia Li, JiaLuo Yang, ChangSheng Zhou, BeiBei Zhi, QuanHui Liu, YingLe Li, LuLu Xiao, WuSheng Zhu, GuangMing Lu
Publikováno v:
Insights into Imaging, Vol 14, Iss 1, Pp 1-10 (2023)
Abstract Objectives Besides plaque enhancement grade, the incremental value of enhancement-related high-resolution MRI features in defining culprit plaques needs further evaluation. This study was focused on assessing whether plaque enhancement featu
Externí odkaz:
https://doaj.org/article/bb4009ac67224a438f29df2349a0f0a6
Temporal link prediction method based on community multi-features fusion and embedded representation
Publikováno v:
网络与信息安全学报, Vol 9, Pp 67-82 (2023)
Dynamic networks integrates time attributes on the basis of static networks, and it contains multiple connotations such as the complexity and dynamics of the network structure.It is a better thinking object for studying complex network link predictio
Externí odkaz:
https://doaj.org/article/364fff26c8fe4214974853bc023ab4fb
Publikováno v:
Biomolecules, Vol 13, Iss 6, p 940 (2023)
Liver fibrosis represents the reversible pathological process with the feature of the over-accumulation of extracellular matrix (ECM) proteins within the liver, which results in the deposition of fibrotic tissues and liver dysfunction. Circular nonco
Externí odkaz:
https://doaj.org/article/24b1fb370a884818836119ae870462e8
Publikováno v:
网络与信息安全学报, Vol 7, Pp 46-56 (2021)
Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic de
Externí odkaz:
https://doaj.org/article/5c5e9a6fe8224fb283547fcc3f93ad47
Publikováno v:
IEEE Access, Vol 7, Pp 125424-125441 (2019)
This paper proposes a systematic analysis method for 5G Non-Access Stratum Signalling security based on formal analysis, which has identified 10 new 5G protocol vulnerabilities, and an improved PKI security mechanism targeted at eliminating these vul
Externí odkaz:
https://doaj.org/article/50e320d8b04740b181ad9147ad99d716
Autor:
Qinghe Geng, Shen Wang, Han Huan, Huabei Sun, Juan Zhai, Kaijin Guo, Huaiyuan Zhai, Ke Heng, Hongwei Li, Jun Liu, Yiru Geng, Guoqiang Huang, Feiyuan Zhang, Jian Li, Yingle Li
Publikováno v:
Bone Reports, Vol 13, Iss , Pp 100419- (2020)
Externí odkaz:
https://doaj.org/article/b7abfdb1e11642d9ba592748be7292b2
Publikováno v:
Entropy, Vol 24, Iss 2, p 296 (2022)
In the domain of network science, the future link between nodes is a significant problem in social network analysis. Recently, temporal network link prediction has attracted many researchers due to its valuable real-world applications. However, the m
Externí odkaz:
https://doaj.org/article/a6074bf703e84409961b3cc67ec881dd
Publikováno v:
网络与信息安全学报, Vol 4, Pp 12-21 (2018)
Ontology is an important tool for knowledge sharing,while it is also the upper structure of knowledge graph.With the explosion of data and ontology complexity,ontology understanding and application are becoming more and more difficult.As a technique
Externí odkaz:
https://doaj.org/article/bbf77eadbfa64175a5567599341f4314
Publikováno v:
Applied Sciences, Vol 8, Iss 1, p 32 (2017)
The theoretical limit of link prediction is a fundamental problem in this field. Taking the network structure as object to research this problem is the mainstream method. This paper proposes a new viewpoint that link prediction methods can be divided
Externí odkaz:
https://doaj.org/article/6b1369889a5f4b1692bad91a7dd0a0fa