CASIA OpenIR

Browse/Search Results:  1-10 of 22 Help

Selected(0)Clear Items/Page:    Sort:
Spatial-Temporal Patterns and Drivers of Illicit Tobacco Trade in Changsha County, China 会议论文
Proceedings paper of the 2016 IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, Tucson, Arizona USA, September 28-30, 2016
Authors:  Jiaojiao Wang;  Saike He;  Yiyuan Xu;  Zhidong Cao;  Lei Wang;  Daniel Dajun Zeng
Adobe PDF(988Kb)  |  Favorite  |  View/Download:121/34  |  Submit date:2016/10/13
Illicit Trade In Tobacco Products (Ittp)  Spatial-temporal Analysis  Hotspots Detection  Clusters  Drivers  
Meme Extraction and Tracing in Crisis Events 会议论文
Proceedings paper of IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, Tucson, Arizona USA, September 28-30, 2016
Authors:  Saike He;  Xiaolong Zheng;  Jiaojiao Wang;  Zhijun Chang;  Yin Luo;  Daniel Zeng;  Xiaolong Zheng, Jiaojiao Wang
View  |  Adobe PDF(1828Kb)  |  Favorite  |  View/Download:128/47  |  Submit date:2016/10/13
Meme Extraction  Meme Tracing  Accessor Variety  
Predicting Popularity of Forum Threads for Public Events Security 会议论文
Proceedings of IEEE Joint Intelligence and Security Informatics Conference (IEEE ISI 2014), the Hague, the Netherlands, 2014-9-24
Authors:  Kong, Qingchao;  Mao, Wenji;  Zeng, Daniel;  Wang, Lei;  Wenji Mao
View  |  Adobe PDF(355Kb)  |  Favorite  |  View/Download:95/31  |  Submit date:2016/06/20
Popularity Of Online Content  Modeling And Prediction Of Popularity Evolution  Social Media Analytics  
Covering based granular computing for conflict analysis 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 566-571
Authors:  Zhu, William;  Wang, Fei-Yue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:39/0  |  Submit date:2015/11/07
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:36/0  |  Submit date:2015/11/06
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:43/0  |  Submit date:2015/11/06
Homeland Security  Intelligence  Information  
CWME: A framework of group support system for emergency responses 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 706-707
Authors:  Li, Yaodong;  He, Huiguang;  Xiao, Baihua;  Wang, Chunheng;  Wang, Feiyue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:44/0  |  Submit date:2015/11/06
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:56/0  |  Submit date:2015/11/06
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:44/0  |  Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  Favorite  |  View/Download:48/8  |  Submit date:2015/11/07