|
|
|
Xin Li, Lu Wang, Yang Xin, Yixian Yang, Qifeng Tang and Yuling Chen
This study can be applied to software vulnerability detection.
|
|
|
|
|
|
|
Kai Zhang, Shoushan Luo, Yang Xin, Hongliang Zhu and Yuling Chen
In this paper, an influence model is proposed to tackle the sequence data analysis problems such as disordering, element missing and random noises. The proposed method can be used for mining intrusion patterns from the intrusion action sequence extracted...
ver más
|
|
|
|
|
|
|
Kai Zhang, Fei Zhao, Shoushan Luo, Yang Xin, Hongliang Zhu and Yuling Chen
With the development of intrusion detection, a number of the intelligence algorithms (e.g., artificial neural networks) are introduced to enhance the performance of the intrusion detection systems. However, many intelligence algorithms should be trained ...
ver más
|
|
|
|
|
|
|
Yunhua He, Yuling Yang, Xinliang Guo and Huanhuan Xia
Pollution flashover accidents pose a great threat to the safe and stable operation of a power system, and superhydrophobic materials have broad application prospects in the field of pollution flashover prevention of the external insulation of transmissio...
ver más
|
|
|
|
|
|
|
Zheng Lu, Yuling Yang, Xilin Lu and Chengqing Liu
Simulating the impact of debris flows on structures and exploring the feasibility of applying energy dissipation devices or shock isolators to reduce the damage caused by debris flows can make great contribution to the design of disaster prevention struc...
ver más
|
|
|
|