Guannan Si

Orcid: 0009-0004-4152-5994

According to our database1, Guannan Si authored at least 18 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Overview of indoor scene recognition and representation methods based on multimodal knowledge graphs.
Appl. Intell., January, 2024

A survey of inductive knowledge graph completion.
Neural Comput. Appl., 2024

2023
Partition-Based Point Cloud Completion Network with Density Refinement.
Entropy, July, 2023

Multi-Step Ahead Prediction for Anomaly Detection of Geomagnetic Observation in HVDC Transmission.
IEEE Access, 2023

2020
Overview and Framework of Quality Service Metrics for Cloud-Based Robotics Platforms.
IEEE Access, 2020

2018
Challenges and Security Issues in Underwater Wireless Sensor Networks.
Proceedings of the 2018 International Conference on Identification, 2018

2017
Lom: Discovering logic flaws within MongoDB-based web applications.
Int. J. Autom. Comput., 2017

App genome: callback sequencing in Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

An Inferential Metamorphic Testing Approach to Reduce False Positives in SQLIV Penetration Test.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Toward hierarchical Petri nets model for dependability evaluation of Internet-scale software.
J. Comput. Methods Sci. Eng., 2016

Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Improvement to Fault Localization Technique Based on Branch-Coverage Spectra.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness.
J. Syst. Softw., 2014

Mosaic method based on feature points detection and tracking for unmanned aerial vehicle videos.
Proceedings of the 10th International Conference on Natural Computation, 2014

2012
Attack Model Based Penetration Test for SQL Injection Vulnerability.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

An Evaluation Model for Dependability of Internet-Scale Software on Basis of Bayesian Networks.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2010
An Evaluation Framework for XML Engine on RDBMS.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010


  Loading...