Aiping Li

Orcid: 0000-0003-3335-0093

According to our database1, Aiping Li authored at least 135 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A survey on cybersecurity knowledge graph construction.
Comput. Secur., January, 2024

2023
Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems.
Comput. Electr. Eng., May, 2023

Higher Vocational Students' Innovation and Entrepreneurship Ability Demand Prediction.
Int. J. Emerg. Technol. Learn., April, 2023

Educational metaverse: an exploration and practice of VR wisdom teaching model in Chinese Open University English course.
Interact. Technol. Smart Educ., 2023

Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Optimization of Teachers' Teaching Behaviors in the Virtual Digital Graphic Design Teaching Environment.
Int. J. Emerg. Technol. Learn., September, 2022

Practical Perception and Quality Evaluation for Teaching of Dynamic Visual Communication Design in the Context of Digital Media.
Int. J. Emerg. Technol. Learn., May, 2022

The Correlation Between Teachers' Visual Digital Media Design Ability and Effective Teaching.
Int. J. Emerg. Technol. Learn., 2022

Multiple Sequential Network Attacks Detection Based on DTW-HMM.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Survey on Threat Hunting: Approaches and Applications.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A General Construction Method of Cyber Security Knowledge Graph.
Proceedings of the 9th International Conference on Behavioural and Social Computing, 2022

RotateQVS: Representing Temporal Information as Rotations in Quaternion Vector Space for Temporal Knowledge Graph Completion.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Detection and Defense Methods of Cyber Attacks.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Few-Shot Knowledge Reasoning: An Attention Mechanism Based Method.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Joint Extraction of Entities and Relations: An Advanced BERT-based Decomposition Method.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Distributed Framework for APT Attack Analysis.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Applications of Knowledge Representation Learning.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

The Framework of the MDATA Computing Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Introduction to the MDATA Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Heterogeneous Ensemble Learning Model Based on Data Distribution for Credit Card Fraud Detection.
Wirel. Commun. Mob. Comput., 2021

Optimisation of line configuration and balancing for reconfigurable transfer lines considering demand uncertainty.
Int. J. Prod. Res., 2021

Target relational attention-oriented knowledge graph reasoning.
Neurocomputing, 2021

Just-in-time parts feeding optimization for assembly lines under travel time uncertainty.
Int. J. Model. Simul. Sci. Comput., 2021

A Novel Encoder-Decoder Knowledge Graph Completion Model for Robot Brain.
Frontiers Neurorobotics, 2021

Public Opinion Early Warning Agent Model: A Deep Learning Cascade Virality Prediction Model Based on Multi-Feature Fusion.
Frontiers Neurorobotics, 2021

Popularity Prediction of Online Contents via Cascade Graph and Temporal Information.
Axioms, 2021

Learning Knowledge Graph Embedding in Semantic Space: A Novel Bi-linear Semantic Matching Method.
Proceedings of the International Joint Conference on Neural Networks, 2021

Focus on Inherent Attributes for Temporal Knowledge Graph Completion.
Proceedings of the International Joint Conference on Neural Networks, 2021

WSN Data Compression Model Based on K-SVD Dictionary and Compressed Sensing.
Proceedings of the Data Science, 2021

Research on effects of pre-trained language models in medical named entity recognition.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

Contextualise Entities and Relations: An Interaction Method for Knowledge Graph Completion.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of Cyber Security Approaches for Prediction.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Multi-source knowledge fusion: a survey.
World Wide Web, 2020

A Multi-Attention Matching Model for Multiple-Choice Reading Comprehension.
Int. J. Cooperative Inf. Syst., 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

Knowledge-Infused Pre-trained Models for KG Completion.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Striking a Balance in Unsupervised Fine-Grained Domain Adaptation Using Adversarial Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Review of APT Attack Detection Methods and Defense Strategies.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An Advanced BERT-Based Decomposition Method for Joint Extraction of Entities and Relations.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Parallel Algorithm for Graph Transaction Based Frequent Subgraph Mining.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Survey on Approaches and Applications of Knowledge Representation Learning.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Knowledge Graph Embedding Method Based on Neural Network.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An Answer Sorting Method Combining Multiple Neural Networks and Attentional Mechanisms.
Proceedings of the Big Data - 8th CCF Conference, 2020

2019
A method for achieving provable data integrity in cloud computing.
J. Supercomput., 2019

MILDMS: Multiple Instance Learning via DD Constraint and Multiple Part Similarity.
Symmetry, 2019

Scalability in manufacturing systems: a hybridized GA approach.
J. Intell. Manuf., 2019

A hybrid CNN-LSTM model for typhoon formation forecasting.
GeoInformatica, 2019

Deep Entity Linking via Eliminating Semantic Ambiguity With BERT.
IEEE Access, 2019

Deep Feature Fusion Multiple Instance Learning for WaDang Recognition.
IEEE Access, 2019

Person Entity Attribute Extraction Based on Siamese Network.
IEEE Access, 2019

Needle in a Haystack: Attack Detection from Large-Scale System Audit.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Few-shot Knowledge Reasoning Method based on Attention Mechanism.
Proceedings of the ICCPR '19: 8th International Conference on Computing and Pattern Recognition, 2019

Research of Trojan Attack Effect Evaluation Based on FAHP.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-source Knowledge Fusion: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Intrusion Detection Results Analysis Based on Variational Auto-Encoder.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Fusion: Introduction of Concepts and Techniques.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FSM-Based Cyber Security Status Analysis Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Joint Extraction of Entities and Relations Based on Multi-label Classification.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Kinematic Characteristics Analysis of Cooperative Welding Robot with Multiple Manipulators.
Proceedings of the 4th Asia-Pacific Conference on Intelligent Robot Systems, 2019

2018
Topics' popularity prediction based on ARMA model.
Proceedings of 2018 International Conference on Mathematics and Artificial Intelligence, 2018

A Practical Approach to Answer Extraction for Constructing QA Solution.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

Attention-based encoder-decoder model for answer selection in question answering.
Frontiers Inf. Technol. Electron. Eng., 2017

Real-time personalized twitter search based on semantic expansion and quality model.
Neurocomputing, 2017

Neural Network Based Web Log Analysis for Web Intrusion Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Preventive maintenance planning in a unreliable production line with a branch buffer.
Proceedings of the 2017 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, 2017

A Framework to Construct Knowledge Base for Cyber Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
多特征层次化答案质量评价方法研究 (Research on Multi-features Hierarchical Answer Quality Evaluation Method).
计算机科学, 2016

Identifying users across social networks based on dynamic core interests.
Neurocomputing, 2016

Combining Deep Learning with Information Retrieval for Question Answering.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Probabilistic n-of-N skyline computation over uncertain data streams.
World Wide Web, 2015

Community structure mining in big data social media networks with MapReduce.
Clust. Comput., 2015

Spammer Detection on Online Social Networks Based on Logistic Regression.
Proceedings of the Web-Age Information Management, 2015

NUDTSNA at TREC 2015 Microblog Track: A Live Retrieval System Framework for Social Network based on Semantic Expansion and Quality Model.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Answer Quality Assessment in CQA Based on Similar Support Sets.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015

Model and Comparison of Membership Testing Approach for Massive Data.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach.
IEEE Trans. Knowl. Data Eng., 2014

Optimization of process planning for cylinder block based on feature machining elements.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Characterized by Subjective Clues on Subjective Text Recognition.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

Synergistic partitioning in multiple large scale social networks.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

Demographic Prediction of Online Social Network Based on Epidemic Model.
Proceedings of the Web Technologies and Applications, 2014

An Advanced Spam Detection Technique Based on Self-adaptive Piecewise Hash Algorithm.
Proceedings of the Web Technologies and Applications, 2014

Analysis on Chinese Microblog Sentiment Based on Syntax Parsing and Support Vector Machine.
Proceedings of the Web Technologies and Applications, 2014

Microblog Sentiment Analysis Model Based on Emoticons.
Proceedings of the Web Technologies and Applications, 2014

Identifying Users Based on Behavioral-Modeling across Social Media Sites.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

A Parallel and Scalable Framework for Non-overlapping Community Detection Algorithms.
Proceedings of the Web Technologies and Applications, 2014

The Research of Partitioning Model Based on Virtual Identity Data.
Proceedings of the Web Technologies and Applications, 2014

2013
Microblog Sentiment Classification Based on Supervised and Unsupervised Combination.
Proceedings of the Trustworthy Computing and Services, 2013

A structure free self-adaptive piecewise hashing algorithm for spam filtering.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

A MapReduce and Information Compression Based Social Community Structure Mining Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

An Efficient Approach on Answering Top-k Queries with Grid Dominant Graph Index.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Study on Transformed Keywords Identification in Spam Filtering.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

General Spatial Skyline Operator.
Proceedings of the Database Systems for Advanced Applications, 2012

2011
Economic production quantity model research based on facility layout planning.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Research and optimization of reconfigurable manufacturing system configuration based on system reliability.
Kybernetes, 2010

Gait analysis of powered bionic lower prosthesis.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Study on Cost-Sensitive Communication Models on Large-scale Monitor Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Research on Broken Mappings Detecting Method Based on Fuzzy Aggregation Operators in Deep Web Integration Environment.
Proceedings of the International Conference on E-Business and E-Government, 2010

A Chinese Synonyms Reduced Algorithm Based on Sememe Tree.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
The Sampling Synchronization of the Chaotic System with Different Structures Based on T-S Model.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Knowledge Fusion and Evaluation System with Fusion-Knowledge Measure.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Online Classification Algorithm for Data Streams Based on Fast Iterative Kernel Principal Component Analysis.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Research on Cost-Sensitive Communication Models over Distributed Data Streams Processing.
Proceedings of the First International Conference on Advances in Databases, 2009

2008
A Cost-Efficient Method for Continuous Top-k Processing over Data Stream.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Finding Correlated Item Pairs through Efficient Pruning with a Given Threshold.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Research on Communication-Efficient Method for Distributed Threshold Monitoring.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

AGV Dispatching Strategy Based on Theory of Constraints.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

2007
Harmonic Triangular Norm Aggregation Operators in Multicriteria Decision Systems.
J. Convergence Inf. Technol., 2007

A Study on Organizational Knowledge in Multi-Agent System.
J. Convergence Inf. Technol., 2007

Detecting Broken Mappings for Deep Web Integration.
Proceedings of the Third International Conference on Semantics, 2007

Product scheduling and manufacturing line reconfiguration using Petri Nets and heuristic search.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Analysis and research of system configuration and economic evaluation of reconfigurable manufacturing system.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Continuous monitoring of skyline query over highly dynamic moving objects.
Proceedings of the Sixth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2007

DRN: A CORBA-Based Distributed Resource Navigation System for Data Grid.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Security Model for Networked Manufacturing System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Continuous Skyline Tracking on Update Data Streams.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Research on Prediction Models over Distributed Data Streams.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Learning fuzzy logic based intelligent determination of feedrate for end milling operation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Internet-based Platform for an Integrated Design of Product and Manufacturing Process for SMEs.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

2004
On Aggregation Operators for Fuzzy Information Sources.
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004

2003
A Rule Induction Method of Plant Disease Description Based on Rough Sets.
Proceedings of the Rough Sets, 2003


  Loading...