The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qinghua Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer
    Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:4-12 [Conf]
  2. Qinghua Zhang, Guoyin Wang, Jun Hu, Xianquan Liu
    Incomplete Information Systems Processing Based on Fuzzy-Clustering. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:486-489 [Conf]
  3. Jun Hu, Guoyin Wang, Qinghua Zhang
    Uncertainty Measure of Covering Generated Rough Set. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:498-504 [Conf]
  4. Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning
    Defending against Sybil Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:185-191 [Conf]
  5. Jun Hu, Guoyin Wang, Qinghua Zhang, Xianquan Liu
    Attribute Reduction Based on Granular Computing. [Citation Graph (0, 0)][DBLP]
    RSCTC, 2006, pp:458-466 [Conf]
  6. Stefano Perabò, Qinghua Zhang
    On the joint estimation of unknown parameters and disturbances in linear stochastic time-variant systems. [Citation Graph (0, 0)][DBLP]
    ICINCO-SPSMC, 2007, pp:385-388 [Conf]
  7. Qinghua Zhang, Nicolas Fréchin, Nicolas Guézé, Patrice Jaulneau
    Data line change detection with application to Mud Logging data processing. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2007, v:87, n:9, pp:2188-2196 [Journal]

  8. Granular Computing based cognitive computing. [Citation Graph (, )][DBLP]


  9. MetaAware: Identifying Metamorphic Malware. [Citation Graph (, )][DBLP]


  10. Cardiosense3d: Patient-Specific Cardiac Simulation. [Citation Graph (, )][DBLP]


  11. Approximation Partition Spaces of Covering Space. [Citation Graph (, )][DBLP]


  12. Quick Building of Fuzzy Equivalence Matrix in Granular Computing. [Citation Graph (, )][DBLP]


  13. Granular Computing based Data Mining in the Views of Rough Set and Fuzzy Set. [Citation Graph (, )][DBLP]


  14. A Security Design of Data Exchange Platform. [Citation Graph (, )][DBLP]


  15. Revisiting the Two-Stage Algorithm for Hammerstein system identification. [Citation Graph (, )][DBLP]


  16. Research on the Preventive Strategy of Credit Risk in On-Line Auction Market. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002