Shengfeng Tian

According to our database1, Shengfeng Tian authored at least 43 papers between 1988 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
An overview of kernel alignment and its applications.
Artif. Intell. Rev., 2015

2014
A Novel Entity Type Filtering Model for Related Entity Finding.
Int. J. Comput. Commun. Control, 2014

2013
A Fast Multiclass Classification Algorithm Based on Cooperative Clustering.
Neural Process. Lett., 2013

An Approach of Filtering Wrong-Type Entities for Entity Ranking.
IEICE Trans. Inf. Syst., 2013

Kernel Polarization Based on Cooperative Clustering.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

2012
Balanced Multi-Label Propagation for Overlapping Community Detection in Social Networks.
J. Comput. Sci. Technol., 2012

Local Support Vector Machine based on Cooperative Clustering for very large-scale dataset.
Proceedings of the Eighth International Conference on Natural Computation, 2012

2011
XSWRL, an Extended Semantic Web Rule Language and prototype implementation.
Expert Syst. Appl., 2011

The model of thunderstorms forecast based on rough set.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

2010
Feature selection for SVM via optimization of kernel polarization with Gaussian ARD kernels.
Expert Syst. Appl., 2010

An ontology-based intrusion alerts correlation system.
Expert Syst. Appl., 2010

Summarization using Wikipedia.
Proceedings of the Third Text Analysis Conference, 2010

A fast and reasonable method for community detection with adjustable extent of overlapping.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

2009
Learning by local kernel polarization.
Neurocomputing, 2009

Feature selection for text classification with Naïve Bayes.
Expert Syst. Appl., 2009

Network forensics based on fuzzy logic and expert system.
Comput. Commun., 2009

Applications of HMM in Protocol Anomaly Detection.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

An Online Adaptive Network Anomaly Detection Model.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
A selective Bayes Classifier for classifying incomplete data based on gain ratio.
Knowl. Based Syst., 2008

Efficient computations of gapped string kernels based on suffix kernel.
Neurocomputing, 2008

High-order Markov kernels for intrusion detection.
Neurocomputing, 2008

Increasing classification efficiency with multiple mirror classifiers.
Expert Syst. Appl., 2008

A Selective Classifier for Incomplete Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

On local kernel polarization.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory.
Proceedings of the Computer Security, 2008

2007
Length-weighted string kernels for sequence data classification.
Pattern Recognit. Lett., 2007

Sequence-similarity kernels for SVMs to detect anomalies in system calls.
Neurocomputing, 2007

Using Length-weighted Once Kernel to Detect Anomalous Process.
Proceedings of the Third International Conference on Natural Computation, 2007

The Training of Radial Basis Function Network Classifier with Cooperative Clustering.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
A Modified RBF Neural Network for Network Anomaly Detection.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Cooperative Clustering for Training SVMs.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Fast Bit-Parallel Algorithm for Gapped String Kernels.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

High-Order Markov Kernels for Network Intrusion Detection.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

OMVD: An Optimization of MVD.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A method of multi-agent system conflict analysis based on rough set theory.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Using Gap-Insensitive String Kernel to Detect Masquerading.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2004
Cluster Validity and Stability of Clustering Algorithms.
Proceedings of the Structural, 2004

Anomaly Detection Using Support Vector Machines.
Proceedings of the Advances in Neural Networks, 2004

2002
An efficient optimality test for the fuzzy c-means algorithm.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002

1988
A rock classification expert system.
Proceedings of the 9th International Conference on Pattern Recognition, 1988


  Loading...