Author of the publication

Evaluation of the efficiency of regional ecological economic system based on the matrix network DEA model of the global framework.

, , , , and . Int. J. Appl. Decis. Sci., 15 (3): 336-364 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Prediction Method Based on Complex Event Processing for Cyber Physical System., , , , , and . MSN, volume 747 of Communications in Computer and Information Science, page 283-292. Springer, (2017)Anti-Radiation Performance Assessment of Satellite Units Based on the Weiner Process., , , , and . IEEE Access, (2018)FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction., , , , , , , and . SEKE, page 79-85. KSI Research Inc., (2021)Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence., , , , and . ICCS (4), volume 13353 of Lecture Notes in Computer Science, page 17-30. Springer, (2022)Efficiency evaluation of regional ecological economic systems based on the network DEA model., , , , and . Int. J. Appl. Decis. Sci., 13 (3): 286-312 (2020)The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence., , , , and . CSCWD, page 1353-1359. IEEE, (2022)Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention., , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1796-1803. IEEE, (2022)Evaluation of the efficiency of regional ecological economic system based on the matrix network DEA model of the global framework., , , , and . Int. J. Appl. Decis. Sci., 15 (3): 336-364 (2022)A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning., , , , , , , and . CSCWD, page 262-267. IEEE, (2021)