LeukocyteMask: An automated localization and segmentation method for leukocyte in blood smear images using deep neural networks H Fan, F Zhang, L Xi, Z Li, G Liu, Y Xu Journal of biophotonics 12 (7), e201800488, 2019 | 80 | 2019 |
Semi-supervised time series classification model with self-supervised learning L Xi, Z Yun, H Liu, R Wang, X Huang, H Fan Engineering Applications of Artificial Intelligence 116, 105331, 2022 | 30 | 2022 |
Correlation-aware deep generative model for unsupervised anomaly detection H Fan, F Zhang, R Wang, L Xi, Z Li Advances in Knowledge Discovery and Data Mining: 24th Pacific-Asia …, 2020 | 29 | 2020 |
Multisource neighborhood immune detector adaptive model for anomaly detection L Xi, RD Wang, ZY Yao, FB Zhang IEEE Transactions on Evolutionary Computation 25 (3), 582-594, 2021 | 13 | 2021 |
An adaptive artificial-fish-swarm-inspired fuzzy C-means algorithm L Xi, F Zhang Neural Computing and Applications 32 (22), 16891-16899, 2020 | 10 | 2020 |
A new parallel segmentation algorithm for medical image S Yongqian, X Liang International Journal of Signal Processing, Image Processing and Pattern …, 2015 | 10 | 2015 |
Unsupervised multimodal domain adversarial network for time series classification L Xi, Y Liang, X Huang, H Liu, A Li Information Sciences 624, 147-164, 2023 | 9 | 2023 |
Anomaly detection algorithm based on FCM with improved krill herd C Rui, Z Fengbin, X Liang Journal of Physics: Conference Series 1187 (4), 042028, 2019 | 9 | 2019 |
Data-correlation-aware unsupervised deep-learning model for anomaly detection in cyber–physical systems L Xi, R Wang, ZJ Haas IEEE Internet of Things Journal 9 (22), 22410-22421, 2022 | 7 | 2022 |
Unsupervised dimension-contribution-aware embeddings transformation for anomaly detection L Xi, C Liang, H Liu, A Li Knowledge-Based Systems 262, 110209, 2023 | 6 | 2023 |
Deep adversarial learning latent representation distribution model for anomaly de⁃ tection L Xi, H Liu, HY FAN, F Zhang Acta Electronica Sinica 49 (7), 1257-1265, 2021 | 5 | 2021 |
Detector optimization algorithm with co-evolution in immunity-based intrusion detection system X Liang, Z Fengbin Proceedings of 2013 2nd International Conference on Measurement, Information …, 2013 | 5 | 2013 |
Caco: attributed network anomaly detection via canonical correlation analysis R Wang, F Zhang, X Huang, C Tian, L Xi, H Fan IEEE Transactions on Industrial Informatics 20 (1), 461-470, 2023 | 4 | 2023 |
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution L Xi, F Zhang, D Wang Artificial Intelligence and Computational Intelligence: International …, 2009 | 4 | 2009 |
[Retracted] Intrusion Detection Method Based on Deep Learning C Tian, F Zhang, Z Li, R Wang, X Huang, L Xi, Y Zhang Wireless Communications and Mobile Computing 2022 (1), 1338392, 2022 | 3 | 2022 |
Anomaly detection algorithm based on FCM with adaptive artificial fish-swarm X Liang, W Yong, Z Fengbin J Comput Res Dev 56, 1048, 2019 | 3 | 2019 |
An Intelligent Catering Service Platform Based on the" Android+ J2EE" Y Xiaozhou, X Liang, M Hongzhi 2015 4th International Conference on Advanced Information Technology and …, 2015 | 3 | 2015 |
Graph-embedding-inspired article recommendation model L Xi, Q Hu, H Liu Expert Systems with Applications 214, 119100, 2023 | 2 | 2023 |
Recent Advances and Prospects of Immunity-based Intrusion Detection Systems X Liang, Z Fengbin Journal of Harbin University of Science and Technology 2 (19), 2014 | 2 | 2014 |
Research on Principal Components Weighted Based on Real-valued Negative Selection Algorithm F Zhang, X Yue, D Wang, L Xi 2011 International Conference on Future Computer Science and Education, 549-552, 2011 | 2 | 2011 |