Jinquan Zeng

According to our database1, Jinquan Zeng authored at least 22 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Application of Combined Filtering in Thunder Recognition.
Remote. Sens., January, 2023

2022
Divide and Conquer: Subset Matching for Scene Graph Generation in Complex Scenes.
IEEE Access, 2022

YOLO-Xweld: Efficiently Detecting Pipeline Welding Defects in X-Ray Images for Constrained Environments.
Proceedings of the International Joint Conference on Neural Networks, 2022

Chinese License Plate Recognition Algorithm Based On UNet3+.
Proceedings of the 3rd International Conference on Computing, 2022

2020
GPS-Net: Graph Property Sensing Network for Scene Graph Generation.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2015
Rumor Identification in Microblogging Systems Based on Users' Behavior.
IEEE Trans. Comput. Soc. Syst., 2015

Clonal Selection-Based Surveillance Algorithm for Transmission Control Protocol Anomaly Network Behavior.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Immunity-Based Detection for Large-Scale Behavior of Denial of Service.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Dynamic Defense Architecture for the Security of the Internet of Things.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Negative Selection Algorithm Based Unknown Malware Detection Model.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

2014
An Artificial Immune System Approach for Malware Detection.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014

2012
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Efficient Detect Scheme of Botnet Command and Control Communication.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
A novel intrusion detection approach learned from the change of antibody concentration in biological immune response.
Appl. Intell., 2011

Research on immunity-based intrusion detection technology for the Internet of Things.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2007
A Computer Forensics Model Based On Danger Theory.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

A Feedback Negative Selection Algorithm to Anomaly Detection.
Proceedings of the Third International Conference on Natural Computation, 2007

A Supervised Classifier Based on Artificial Immune System.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Artificial Immunity-Based Discovery for Popular Information in WEB Pages.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Exploration of Network Security Information Hid in Web Pages Based on Immunology.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
An Immune-Based Model for Service Survivability.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...