Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network

    The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and th...

    Yan Zhou, Huiling Shi, Yanling Zhao, Wei Ding, **g Han in Journal of Cloud Computing (2023)

  2. Article

    Open Access

    Exploring the relationship between computational thinking and learning satisfaction for non-STEM college students

    While various studies have focused on the significance of computational thinking (CT) for the future career paths of individuals in science, technology, engineering, and mathematics (STEM), few studies have fo...

    Chien Hsiang Liao, Chang-Tang Chiang in International Journal of Educational Techn… (2022)

  3. No Access

    Article

    Efficient discovery of contrast subspaces for object explanation and characterization

    We tackle the novel problem of mining contrast subspaces. Given a set of multidimensional objects in two classes \(C_+\) ...

    Lei Duan, Guanting Tang, Jian Pei, James Bailey in Knowledge and Information Systems (2016)

  4. No Access

    Chapter and Conference Paper

    Mining Top-k Distinguishing Sequential Patterns with Flexible Gap Constraints

    Distinguishing sequential pattern (DSP) mining has been widely employed in many applications, such as building classifiers and comparing/analyzing protein families. However, in previous studies on DSP mining, ...

    Chao Gao, Lei Duan, Guozhu Dong, Haiqing Zhang, Hao Yang in Web-Age Information Management (2016)

  5. No Access

    Chapter and Conference Paper

    Hierarchical Community Evolution Mining from Dynamic Networks

    Research on community evolution contributes to understanding the nature of network evolution. Previous community evolution studies have two defects: (1) the algorithms do not have sufficient stability or canno...

    Yonghui Zhang, Chuan Li, Yanmei Li, Changjie Tang in Web-Age Information Management (2015)

  6. No Access

    Chapter and Conference Paper

    Mining Itemset-based Distinguishing Sequential Patterns with Gap Constraint

    Mining contrast sequential patterns, which are sequential patterns that characterize a given sequence class and distinguish that class from another given sequence class, has a wide range of applications includ...

    Hao Yang, Lei Duan, Guozhu Dong in Database Systems for Advanced Applications (2015)

  7. No Access

    Chapter and Conference Paper

    Mining Frequent Closed Sequential Patterns with Non-user-defined Gap Constraints

    Frequent closed sequential pattern mining plays an important role in sequence data mining and has a wide range of applications in real life, such as protein sequence analysis, financial data investigation, and...

    Wentao Wang, Lei Duan, Jyrki Nummenmaa, Song Deng in Advanced Data Mining and Applications (2014)

  8. No Access

    Chapter and Conference Paper

    Efficient Mining of Density-Aware Distinguishing Sequential Patterns with Gap Constraints

    Distinguishing sequential patterns are useful in characterizing a given sequence class and contrasting that class against other sequence classes. This paper introduces the density concept into distinguishing s...

    **anming Wang, Lei Duan, Guozhu Dong in Database Systems for Advanced Applications (2014)

  9. No Access

    Chapter and Conference Paper

    Searching Similar Trajectories in Real Time: An Effectiveness and Efficiency Study

    Searching similar trajectories in real time has been a challenging task in a large variety of location-aware applications. This paper addresses its two key issues, i.e. evaluating the similarity between two tr...

    Yuchi Ma, Chunyan Qu, Tingting Liu, Ning Yang in Web-Age Information Management (2012)

  10. No Access

    Chapter and Conference Paper

    Detection of High-Risk Zones and Potential Infected Neighbors from Infectious Disease Monitoring Data

    Detecting the high-risk zones as well as potential infected geographical neighbor is necessary and important to reduce the loss caused by infectious disease. However, it is a challenging work, since the outbre...

    Biying Tan, Lei Duan, Chi Gou, Shuyang Huang in Database Systems for Advanced Applications (2012)

  11. No Access

    Chapter and Conference Paper

    Early Prediction of Temporal Sequences Based on Information Transfer

    In recent years, early prediction for ongoing sequences has been more and more valuable in a large variety of time-critical applications which demand to classify an ongoing sequence in its early stage. There a...

    Ning Yang, Jian Peng, Yu Chen, Changjie Tang in Web-Age Information Management (2011)

  12. Chapter and Conference Paper

    Mining Good Sliding Window for Positive Pathogens Prediction in Pathogenic Spectrum Analysis

    Positive pathogens prediction is the basis of pathogenic spectrum analysis, which is a meaningful work in public health. Gene Expression Programming (GEP) can develop the model without predetermined assumption...

    Lei Duan, Changjie Tang, Chi Gou, Min Jiang in Advanced Data Mining and Applications (2011)

  13. No Access

    Chapter and Conference Paper

    Efficient Subject-Oriented Evaluating and Mining Methods for Data with Schema Uncertainty

    With the progressing of data collecting methods, people have already collected scales of data for various application fields such as medical science, meteorology, electronic commerce and so on. To analyze thes...

    Yue Wang, Changjie Tang, Tengjiao Wang in Advanced Data Mining and Applications (2011)

  14. No Access

    Chapter and Conference Paper

    An MDL Approach to Efficiently Discover Communities in Bipartite Network

    Bipartite network is a branch of complex network. It is widely used in many applications such as social network analysis, collaborative filtering and information retrieval. Partitioning a bipartite network int...

    Kaikuo Xu, Changjie Tang, Chuan Li in Database Systems for Advanced Applications (2010)

  15. No Access

    Chapter and Conference Paper

    Hotspot District Trajectory Prediction

    Trajectory prediction (TP) of moving objects has grown rapidly to be a new exciting paradigm. However, existing prediction algorithms mainly employ kinematical models to approximate real world routes and alway...

    Hongjun Li, Changjie Tang, Shaojie Qiao, Yue Wang in Web-Age Information Management (2010)

  16. No Access

    Book and Conference Proceedings

    Web-Age Information Management

    11th International Conference, WAIM 2010, Jiuzhaigou, China, July 15-17, 2010. Proceedings

    Lei Chen, Changjie Tang, Jun Yang in Lecture Notes in Computer Science (2010)

  17. No Access

    Chapter and Conference Paper

    Meta Galaxy: A Flexible and Efficient Cube Model for Data Retrieval in OLAP

    OLAP is widely used in data analysis. The existing design models, such as star schema and snowflake schema, are not flexible when the data model is changed. For example, the task for inserting a dimension may ...

    Jie Zuo, Changjie Tang, Lei Duan, Yue Wang in Advances in Web and Network Technologies, … (2009)

  18. No Access

    Chapter and Conference Paper

    Mining Interventions from Parallel Event Sequences

    Discovering temporal patterns from sequence data has been an important task of data mining in recent years. In this paper a novel temporal pattern, Intervention, is proposed to capture the partial ordering relati...

    Ning Yang, Changjie Tang, Yue Wang, Rong Tang in Advances in Data and Web Management (2009)

  19. No Access

    Chapter and Conference Paper

    Intervention Events Detection and Prediction in Data Streams

    Mining interesting patterns in data streams has attracted special attention recently. This study revealed the principles behind observations, through variation of intervention events to analyze the trends in t...

    Yue Wang, Changjie Tang, Chuan Li, Yu Chen in Advances in Data and Web Management (2009)

  20. No Access

    Chapter and Conference Paper

    Core-Tag Clustering for Web 2.0 Based on Multi-similarity Measurements

    Along with the development of Web2.0, folksonomy has become a hot topic related to data mining, information retrieval and social network. The tag semantic is the key for deep understanding the correlation of o...

    Yexi Jiang, Changjie Tang, Kaikuo Xu in Advances in Web and Network Technologies, … (2009)

previous disabled Page of 3