Follow
Yuanping Nie
Title
Cited by
Cited by
Year
Identifying users across social networks based on dynamic core interests
Y Nie, Y Jia, S Li, X Zhu, A Li, B Zhou
Neurocomputing 210, 107-115, 2016
1142016
Attention-based encoder-decoder model for answer selection in question answering
Y Nie, Y Han, J Huang, B Jiao, A Li
Frontiers of Information Technology & Electronic Engineering 18 (4), 535-544, 2017
372017
A multi-attention-based bidirectional long short-term memory network for relation extraction
L Li, Y Nie, W Han, J Huang
Neural Information Processing: 24th International Conference, ICONIP 2017 …, 2017
202017
Spammer detection on online social networks based on logistic regression
X Zhu, Y Nie, S Jin, A Li, Y Jia
Web-Age Information Management: WAIM 2015 International Workshops: HENA …, 2015
182015
Accurately and quickly calculating the weighted spectral distribution
B Jiao, Y Nie, J Shi, G Lu, Y Zhou, J Du
Telecommunication Systems 62, 231-243, 2016
172016
Deception approach to track-to-track radar fusion using noncoherent dual-source jamming
B Rao, Z Gu, Y Nie
IEEE Access 8, 50843-50858, 2020
152020
Identifying users based on behavioral-modeling across social media sites
Y Nie, J Huang, A Li, B Zhou
Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb …, 2014
142014
Scaling of weighted spectral distribution in deterministic scale-free networks
B Jiao, Y Nie, J Shi, C Huang, Y Zhou, J Du, R Guo, Y Tao
Physica A: Statistical Mechanics and its Applications 451, 632-645, 2016
122016
Correlation between weighted spectral distribution and average path length in evolving networks
B Jiao, J Shi, X Wu, Y Nie, C Huang, J Du, Y Zhou, R Guo, Y Tao
Chaos: An Interdisciplinary Journal of Nonlinear Science 26 (2), 2016
122016
Demographic prediction of online social network based on epidemic model
X Zhu, Y Nie, A Li
Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014
112014
A Survey of bit-flip attacks on deep neural network and corresponding defense methods
C Qian, M Zhang, Y Nie, S Lu, H Cao
Electronics 12 (4), 853, 2023
92023
Grapheye: A novel solution for detecting vulnerable functions based on graph attention network
L Zhou, M Huang, Y Li, Y Nie, J Li, Y Liu
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021
82021
Track-before-detect of weak ballistic target using elliptical Hough transform
B Rao, ZW Zong, YP Nie
IET Digital Library, 2013
72013
ICDF: Intrusion collaborative detection framework based on confidence
Z Wang, L Shao, K Cheng, Y Liu, J Jiang, Y Nie, X Li, X Kuang
International Journal of Intelligent Systems 37 (10), 7180-7199, 2022
62022
Detection and tracking of weak exoatmospheric target with elliptical hough transform
B Rao, Y Zhou, Y Nie
Remote Sensing 14 (3), 491, 2022
62022
A bidirectional LSTM model for question title and body analysis in question answering
Y Nie, C An, J Huang, Z Yan, Y Han
2016 IEEE First International Conference on Data Science in Cyberspace (DSC …, 2016
62016
Answer quality assessment in CQA based on similar support sets
Z Xie, Y Nie, S Jin, S Li, A Li
Chinese Computational Linguistics and Natural Language Processing Based on …, 2015
62015
Calculation of network security index based on convolution neural networks
H Yang, Y Jia, WH Han, YP Nie, SD Li, XJ Zhao
International Conference on Artificial Intelligence and Security, 530-540, 2019
52019
Comparison of biased and unbiased sampling algorithms using graph metrics
B Jiao, YP Nie, RH Guo, YC Jin, XL Pang, Z Han, Y Zhou
2016 International Symposium on Computer, Consumer and Control (IS3C), 212-215, 2016
42016
Static analysis of source code vulnerability using machine learning techniques: A survey
J Wang, M Huang, Y Nie, J Li
2021 4th International Conference on Artificial Intelligence and Big Data …, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20