Jianqi Zhu

According to our database1, Jianqi Zhu authored at least 16 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Feature selection using max dynamic relevancy and min redundancy.
Pattern Anal. Appl., May, 2023

Dynamic interaction-based feature selection algorithm for maximal relevance minimal redundancy.
Appl. Intell., April, 2023

2019
Simulating email worm propagation based on social network and user behavior.
Int. Arab J. Inf. Technol., 2019

2018
Application-value-awareness cross-layer MAC cooperative game for vehicular networks.
Veh. Commun., 2018

Spatio-Temporal Location Privacy Quantification for Vehicular Networks.
IEEE Access, 2018

2014
Approaches to multiple attribute decision making with hesitant interval-valued fuzzy information under correlative environment.
J. Intell. Fuzzy Syst., 2014

2013
Dynamic entropy based DoS attack detection method.
Comput. Electr. Eng., 2013

2012
Feature evaluation and selection with cooperative game theory.
Pattern Recognit., 2012

A DoS Detection Method Based on Composition Self-Similarity.
KSII Trans. Internet Inf. Syst., 2012

Using cooperative game theory to optimize the feature selection problem.
Neurocomputing, 2012

2011
H Function based Tamper-proofing Software Watermarking Scheme.
J. Softw., 2011

2010
A Novel Planar IPPCT Tree Structure and Characteristics Analysis.
J. Softw., 2010

2009
A Novel Method-Based Software Watermarking Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Robust Dynamic Watermarking Scheme Based on STBDW.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Research on hiberarchy trusted network based on the grade division.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

A New Remediation Model Based on Trusted Network.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...