CASIA OpenIR

Browse/Search Results:  1-10 of 23 Help

Selected(0)Clear Items/Page:    Sort:
Identifying Risks of the Internet Finance Platforms Using Multi-Source Text Data 会议论文
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, Shenzhen, China, 2019-7-1
Authors:  Donglei Zhang;  Jie Bai;  Lei Wang;  Min He;  Yin Luo
Favorite  |  View/Download:0/0  |  Submit date:2020/10/21
Internet Finance Platforms  Risk Identification  Risk Index System  Text Mining  
Spatial-Temporal Patterns and Drivers of Illicit Tobacco Trade in Changsha County, China 会议论文
Proceedings paper of the 2016 IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, Tucson, Arizona USA, September 28-30, 2016
Authors:  Jiaojiao Wang;  Saike He;  Yiyuan Xu;  Zhidong Cao;  Lei Wang;  Daniel Dajun Zeng
Adobe PDF(988Kb)  |  Favorite  |  View/Download:171/47  |  Submit date:2016/10/13
Illicit Trade In Tobacco Products (Ittp)  Spatial-temporal Analysis  Hotspots Detection  Clusters  Drivers  
Meme Extraction and Tracing in Crisis Events 会议论文
Proceedings paper of IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, Tucson, Arizona USA, September 28-30, 2016
Authors:  Saike He;  Xiaolong Zheng;  Jiaojiao Wang;  Zhijun Chang;  Yin Luo;  Daniel Zeng;  Xiaolong Zheng, Jiaojiao Wang
View  |  Adobe PDF(1828Kb)  |  Favorite  |  View/Download:205/73  |  Submit date:2016/10/13
Meme Extraction  Meme Tracing  Accessor Variety  
Predicting Popularity of Forum Threads for Public Events Security 会议论文
Proceedings of IEEE Joint Intelligence and Security Informatics Conference (IEEE ISI 2014), the Hague, the Netherlands, 2014-9-24
Authors:  Kong, Qingchao;  Mao, Wenji;  Zeng, Daniel;  Wang, Lei;  Wenji Mao
View  |  Adobe PDF(355Kb)  |  Favorite  |  View/Download:159/46  |  Submit date:2016/06/20
Popularity Of Online Content  Modeling And Prediction Of Popularity Evolution  Social Media Analytics  
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:65/0  |  Submit date:2015/11/06
Homeland Security  Intelligence  Information  
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:72/0  |  Submit date:2015/11/07
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:105/0  |  Submit date:2015/11/06
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  Favorite  |  View/Download:73/10  |  Submit date:2015/11/07
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:54/0  |  Submit date:2015/11/06
A multiclass classifier to detect pedestrians and acquire their moving styles 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 758-759
Authors:  Chen, D.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY;  Chen, D
Favorite  |  View/Download:65/0  |  Submit date:2015/11/07