关注
Liang Xi
Liang Xi
Harbin University of Science and Technology
在 hrbust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
LeukocyteMask: An automated localization and segmentation method for leukocyte in blood smear images using deep neural networks
H Fan, F Zhang, L Xi, Z Li, G Liu, Y Xu
Journal of biophotonics 12 (7), e201800488, 2019
802019
Semi-supervised time series classification model with self-supervised learning
L Xi, Z Yun, H Liu, R Wang, X Huang, H Fan
Engineering Applications of Artificial Intelligence 116, 105331, 2022
302022
Correlation-aware deep generative model for unsupervised anomaly detection
H Fan, F Zhang, R Wang, L Xi, Z Li
Advances in Knowledge Discovery and Data Mining: 24th Pacific-Asia …, 2020
292020
Multisource neighborhood immune detector adaptive model for anomaly detection
L Xi, RD Wang, ZY Yao, FB Zhang
IEEE Transactions on Evolutionary Computation 25 (3), 582-594, 2021
132021
An adaptive artificial-fish-swarm-inspired fuzzy C-means algorithm
L Xi, F Zhang
Neural Computing and Applications 32 (22), 16891-16899, 2020
102020
A new parallel segmentation algorithm for medical image
S Yongqian, X Liang
International Journal of Signal Processing, Image Processing and Pattern …, 2015
102015
Unsupervised multimodal domain adversarial network for time series classification
L Xi, Y Liang, X Huang, H Liu, A Li
Information Sciences 624, 147-164, 2023
92023
Anomaly detection algorithm based on FCM with improved krill herd
C Rui, Z Fengbin, X Liang
Journal of Physics: Conference Series 1187 (4), 042028, 2019
92019
Data-correlation-aware unsupervised deep-learning model for anomaly detection in cyber–physical systems
L Xi, R Wang, ZJ Haas
IEEE Internet of Things Journal 9 (22), 22410-22421, 2022
72022
Unsupervised dimension-contribution-aware embeddings transformation for anomaly detection
L Xi, C Liang, H Liu, A Li
Knowledge-Based Systems 262, 110209, 2023
62023
Deep adversarial learning latent representation distribution model for anomaly de⁃ tection
L Xi, H Liu, HY FAN, F Zhang
Acta Electronica Sinica 49 (7), 1257-1265, 2021
52021
Detector optimization algorithm with co-evolution in immunity-based intrusion detection system
X Liang, Z Fengbin
Proceedings of 2013 2nd International Conference on Measurement, Information …, 2013
52013
Caco: attributed network anomaly detection via canonical correlation analysis
R Wang, F Zhang, X Huang, C Tian, L Xi, H Fan
IEEE Transactions on Industrial Informatics 20 (1), 461-470, 2023
42023
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution
L Xi, F Zhang, D Wang
Artificial Intelligence and Computational Intelligence: International …, 2009
42009
[Retracted] Intrusion Detection Method Based on Deep Learning
C Tian, F Zhang, Z Li, R Wang, X Huang, L Xi, Y Zhang
Wireless Communications and Mobile Computing 2022 (1), 1338392, 2022
32022
Anomaly detection algorithm based on FCM with adaptive artificial fish-swarm
X Liang, W Yong, Z Fengbin
J Comput Res Dev 56, 1048, 2019
32019
An Intelligent Catering Service Platform Based on the" Android+ J2EE"
Y Xiaozhou, X Liang, M Hongzhi
2015 4th International Conference on Advanced Information Technology and …, 2015
32015
Graph-embedding-inspired article recommendation model
L Xi, Q Hu, H Liu
Expert Systems with Applications 214, 119100, 2023
22023
Recent Advances and Prospects of Immunity-based Intrusion Detection Systems
X Liang, Z Fengbin
Journal of Harbin University of Science and Technology 2 (19), 2014
22014
Research on Principal Components Weighted Based on Real-valued Negative Selection Algorithm
F Zhang, X Yue, D Wang, L Xi
2011 International Conference on Future Computer Science and Education, 549-552, 2011
22011
系统目前无法执行此操作,请稍后再试。
文章 1–20