Kaiquan Shi

According to our database1, Kaiquan Shi authored at least 37 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Matrix reasoning and intelligent acquisition-application of unknown information.
Soft Comput., 2022

2020
Dynamic Boundary of P-Set and Intelligent Acquisition for Two Types of Information Fusion.
Comput., 2020

2018
两类动态信息模型及其应用 (Two Types of Dynamic Information Models and Their Applications).
计算机科学, 2018

P-数据模型与数据的智能获取 (P-data Model and Intelligent Acquisition of P-data).
计算机科学, 2018

两类动态信息规律模型及其在信息伪装、风险识别中的应用 (Two Types of Dynamic Information Law Models and Their Applications in Information Camouflage and Risk Identification).
计算机科学, 2018

2016
The generation of band information law and the dynamic hiding of information law.
Int. J. Mach. Learn. Cybern., 2016

逆P-集合的边界特征与系统状态监测 (Boundary Characteristics of Inverse P-sets and System Condition Monitoring).
计算机科学, 2016

The dynamic segmentation characteristics of P-augmented matrix and the dynamic intelligent acquisition of P-information.
Int. J. Appl. Decis. Sci., 2016

2015
具有属性析取萎缩-扩张特征的动态数据智能挖掘 (Dynamic Data Intelligent Mining with Attributes Disjunctive Reduction and Expansion Characteristics).
计算机科学, 2015

动态知识智能发现与属性逻辑动态关系 (Intelligent Discovery of Dynamic Knowledges and Logic Dynamic Relation between their Attributes).
计算机科学, 2015

信息规律智能融合与它的智能融合内-分离 (Intelligent Fusion of Information Law and its Inner Separating).
计算机科学, 2015

具有属性析取扩展特征的内逆P-信息智能挖掘 (Intelligent Mining for P-Information with Expanded Characteristic of Disjunctive Attribute).
计算机科学, 2015

P-information Law Models and the Separation-Discovery of Unknown Information Law.
Proceedings of the Fuzzy System and Data Mining, 2015

2014
Function Inverse P-sets and the Hiding Information Generated by Function Inverse P-information Law Fusion.
Proceedings of the Digital Services and Information Intelligence, 2014

2011
Function P-sets.
Int. J. Mach. Learn. Cybern., 2011

2010
Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II).
Comput. Inf. Sci., 2010

2008
Function S-rough sets and security-authentication of hiding law.
Sci. China Ser. F Inf. Sci., 2008

Function S-rough sets and law identification.
Sci. China Ser. F Inf. Sci., 2008

Discernable matrix and its application in decision rules.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

S-rough sets and the dependent separation by its F-attribute interference.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Function S-rough Sets and image F-interior hiding.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Rough law generation and the discovery of F - rough law.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Function one direction S-rough sets and F -decomposition of image.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Rough data and rough data law recognition.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Analysis on earthquake precursory anomalies based on two direction S-rough sets.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

An Improved Intermediate Value Theorem and Rough Fix-Point Theorem of Roughly Continuous Discrete Functions.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Attribute Composition Distribution and Rough Law Status Estimation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Function S-Rough Sets Method in Feature Selection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Singular Rough Sets Method in Attribute Generalization.
Proceedings of the Fuzzy Information and Engineering, 2008

S-Rough Sets and -Knowledge Hiding-Discovery.
Proceedings of the Fuzzy Information and Engineering, 2008

2007
Function Two Direction S-Rough Sets Method in Image Hiding.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Rough Communication of Dynamic Concept.
Proceedings of the Fuzzy Information and Engineering, 2007

2006
Function S-Rough Sets and Recognition of Financial Risk Laws.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Weighted Rough Graph and Its Application.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2003
Both-branch fuzzy decision and decision encryption-authentication.
Sci. China Ser. F Inf. Sci., 2003

2001
A public cryptosystem based on the generated data in extension set.
Proceedings of the IEEE International Conference on Systems, 2001

2000
The α-embedded and A's fuzzy decomposition theorems.
Fuzzy Sets Syst., 2000


  Loading...