Author of the publication

Modeling Air Pollution Transmission Behavior as Complex Network and Mining Key Monitoring Station.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis on Influential Functions in the Weighted Software Network., , , , and . Secur. Commun. Networks, (2018)Features Extraction Based on Neural Network for Cross-Domain Sentiment Classification., , , and . DASFAA Workshops, volume 9645 of Lecture Notes in Computer Science, page 81-88. Springer, (2016)Distributed Kalman filter for multi-agent tracking with Markov intermittent observation., and . RCVE, page 1-6. ACM, (2023)Approach to mine influential functions based on software execution sequence., , , and . IET Softw., 11 (2): 48-54 (2017)Modeling Air Pollution Transmission Behavior as Complex Network and Mining Key Monitoring Station., , , , and . IEEE Access, (2019)Application of artificial fish swarm optimization semi-supervised kernel fuzzy clustering algorithm in network intrusion., and . J. Intell. Fuzzy Syst., 39 (2): 1619-1626 (2020)Mining important nodes in complex software network based on ripple effects of probability., , , , , and . ACM TUR-C, page 51:1-51:8. ACM, (2019)A Congestion Control Approach for Licklider Transmission Protocol., and . IEEE Access, (2019)Automatic Classification Method for Software Vulnerability Based on Deep Neural Network., , , , , and . IEEE Access, (2019)Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review., , , and . ACM Comput. Surv., 54 (9): 190:1-190:35 (2022)