Zobrazeno 1 - 10
of 907
pro vyhledávání: '"Zhoujun Li"'
Autor:
Yue Qiu, Hongcheng Guo, Shixin Wang, Shu Yang, Xiafeng Peng, Dongqin Xiayao, Renjie Chen, Jian Yang, Jiaheng Liu, Mingfang Li, Zhoujun Li, Hongwu Chen, Minglong Chen
Publikováno v:
BMC Medical Informatics and Decision Making, Vol 24, Iss 1, Pp 1-10 (2024)
Abstract Background Despite improvement in treatment strategies for atrial fibrillation (AF), a significant proportion of patients still experience recurrence after ablation. This study aims to propose a novel algorithm based on Transformer using sur
Externí odkaz:
https://doaj.org/article/e52e312d85514a33bda9fe6356180a2f
Autor:
Shuai Chen, Zhoujun Li
Publikováno v:
IEEE Access, Vol 12, Pp 84064-84073 (2024)
In the realm of graph-based recommendation algorithms, the concept of metapaths plays a pivotal role in capturing complex semantic relationships between various types of entities, thereby significantly enhancing the recommendation quality. However, e
Externí odkaz:
https://doaj.org/article/b7bad20c616c4c64a16725fa38b2adb5
Autor:
Shuai Chen, Zhoujun Li
Publikováno v:
IEEE Access, Vol 12, Pp 75532-75541 (2024)
Knowledge enhanced recommendation algorithms focus on how to leverage auxiliary information from knowledge graphs to enhance recommendation performance. However, existing methods for knowledge enhanced recommendation often overlook the issues of the
Externí odkaz:
https://doaj.org/article/afc37208d5ac488aaa97408ca2968a76
Publikováno v:
IEEE Access, Vol 11, Pp 26033-26047 (2023)
The attacks and defenses on the information of which website pages are visited by users are important research subjects in the field of privacy enhancing technologies, they are termed as website fingerprinting (WF) attacks and defenses. Nowadays, dee
Externí odkaz:
https://doaj.org/article/f1f3e1a02d3e44b9ba0b876b9ba1d69a
Publikováno v:
Symmetry, Vol 15, Iss 12, p 2197 (2023)
Automatic Exploit Generation (AEG) involves automatically discovering paths in a program that trigger vulnerabilities, thereby generating exploits. While there is considerable research on heap-related vulnerability detection, such as detecting Heap O
Externí odkaz:
https://doaj.org/article/db5b83a83db944358493423781934997
Publikováno v:
IEEE Access, Vol 9, Pp 44502-44513 (2021)
The wide use of browser extensions brings the privacy leakage problem. The previous works detected private data transmission to find privacy leakage in Chrome or Firefox, but the real challenge is to determine whether the transmission is reasonable b
Externí odkaz:
https://doaj.org/article/e07e4677e09a4a6ab69c877616573544
Publikováno v:
IEEE Access, Vol 8, Pp 789-801 (2020)
Privacy has become a major concern in data mining as it is utilized in many important applications. Distributed privacy-preserving data mining (DPPDM) is one of the techniques to address this concern, which focuses on protecting private information o
Externí odkaz:
https://doaj.org/article/c72ddc429ae348e3935af5bdaffac8f8
Publikováno v:
IEEE Access, Vol 8, Pp 170128-170139 (2020)
With the development of the wireless network techniques, the number of cyber-attack increases significantly, which has seriously threat the security of Wireless Local Area Network (WLAN). The traditional intrusion detection technology is a prevalent
Externí odkaz:
https://doaj.org/article/960228664d6b4c0590131cd9550c9d0f
Publikováno v:
Symmetry, Vol 15, Iss 1, p 145 (2023)
The Programmable Logic Controller (PLC) is located at the junction of the virtual network and physical reality in the Industrial Control System (ICS), which is vulnerable to attacks due to its weak security. Specifically, firmware tampering attacks t
Externí odkaz:
https://doaj.org/article/1b45a39e1f404c60ad6efd78c389e223
Publikováno v:
ACM Computing Surveys; Dec2023, Vol. 55 Issue 12, p1-37, 37p