default search action
Jinquan Zeng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Junwei Wang, Yunpeng Wang, Jinquan Zeng:
Hybrid Encoder for Anomaly Detection Based on Latent Feature Regularization. ICANN (3) 2024: 3-13 - 2023
- [j4]Yao Wang, Jing Yang, Qilin Zhang, Jinquan Zeng, Boyi Mu, Junzhi Du, Zhekai Li, Yuhui Shao, Jialei Wang, Zhouxin Li:
Application of Combined Filtering in Thunder Recognition. Remote. Sens. 15(2): 432 (2023) - 2022
- [j3]Xin Lin, Jinquan Zeng, Xingquan Li:
Divide and Conquer: Subset Matching for Scene Graph Generation in Complex Scenes. IEEE Access 10: 39069-39079 (2022) - [c18]Menghu Li, Fei Ren, Zhonglin Zhang, Yong Long, Jinquan Zeng:
Chinese License Plate Recognition Algorithm Based On UNet3+. CNIOT 2022: 60-64 - [c17]Jun Yang, Bo Fu, Jinquan Zeng, Shengxi Wu:
YOLO-Xweld: Efficiently Detecting Pipeline Welding Defects in X-Ray Images for Constrained Environments. IJCNN 2022: 1-7 - 2020
- [c16]Xin Lin, Changxing Ding, Jinquan Zeng, Dacheng Tao:
GPS-Net: Graph Property Sensing Network for Scene Graph Generation. CVPR 2020: 3743-3752 - [i1]Xin Lin, Changxing Ding, Jinquan Zeng, Dacheng Tao:
GPS-Net: Graph Property Sensing Network for Scene Graph Generation. CoRR abs/2003.12962 (2020)
2010 – 2019
- 2015
- [j2]Gang Liang, Wenbo He, Chun Xu, Liangyin Chen, Jinquan Zeng:
Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Soc. Syst. 2(3): 99-108 (2015) - [c15]Jinquan Zeng, Weiwen Tang:
Negative Selection Algorithm Based Unknown Malware Detection Model. BIC-TA 2015: 598-608 - [c14]Caiming Liu, Yan Zhang, Zhonghua Li, Jiandong Zhang, Hongying Qin, Jinquan Zeng:
Dynamic Defense Architecture for the Security of the Internet of Things. CIS 2015: 390-393 - [c13]Yan Zhang, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li, Jinquan Zeng:
Immunity-Based Detection for Large-Scale Behavior of Denial of Service. CIS 2015: 437-440 - [c12]Yan Zhang, Caiming Liu, Qin Li, Zhonghua Li, Hongying Qin, Jinquan Zeng:
Clonal Selection-Based Surveillance Algorithm for Transmission Control Protocol Anomaly Network Behavior. SKG 2015: 168-173 - 2014
- [c11]Jinquan Zeng, Weiwen Tang:
An Artificial Immune System Approach for Malware Detection. BIC-TA 2014: 557-561 - 2012
- [c10]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. ICICA (LNCS) 2012: 229-235 - [c9]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Efficient Detect Scheme of Botnet Command and Control Communication. ICICA (1) 2012: 576-581 - [c8]Caiming Liu, Yan Zhang, Jinquan Zeng, Lingxi Peng, Run Chen:
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology. ICNC 2012: 874-878 - 2011
- [j1]Jie Zeng, XiaoJie Liu, Tao Li, Guiyang Li, Haibo Li, Jinquan Zeng:
A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1): 41-62 (2011) - [c7]Caiming Liu, Jin Yang, Run Chen, Yan Zhang, Jinquan Zeng:
Research on immunity-based intrusion detection technology for the Internet of Things. ICNC 2011: 212-216
2000 – 2009
- 2007
- [c6]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c5]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - [c4]Lingxi Peng, Yinqiao Peng, XiaoJie Liu, Caiming Liu, Jinquan Zeng, Feixian Sun, Zhengtian Lu:
A Supervised Classifier Based on Artificial Immune System. International Conference on Computational Science (2) 2007: 355-362 - [c3]Jinquan Zeng, Tao Li, Xiaojie Liu, Caiming Liu, Lingxi Peng, Feixian Sun:
A Feedback Negative Selection Algorithm to Anomaly Detection. ICNC (3) 2007: 604-608 - [c2]Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang:
A Computer Forensics Model Based On Danger Theory. IITA 2007: 87-90 - 2006
- [c1]Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. CANS 2006: 354-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint