


default search action
Feng Jiang 0019
Person information
Other persons with the same name
- Feng Jiang — disambiguation page
- Feng Jiang 0001
— Harbin Institute of Technology, Department of Computer Science and Technology, China
- Feng Jiang 0002 — University of California at Irvine, Department of Electrical Engineering and Computer Science, Center for Pervasive Communications and Computing, CA, USA
- Feng Jiang 0003
— Zhongnan University of Economics and Law, School of Statistics and Mathematics, Wuhan, China (and 1 more)
- Feng Jiang 0004
— Southwest Jiaotong University, School of Transportation and Logistics, Chengdu, China (and 1 more)
- Feng Jiang 0005
— Nanjing University, Department of Computer Science and Technology / State Key Laboratory for Novel Software Technology, China (and 1 more)
- Feng Jiang 0006 — Chongqing University, Key Laboratory of Dependable Service Computing in Cyber Physical Society, China
- Feng Jiang 0007
— Chinese University of Hong Kong, Shenzhen, China
- Feng Jiang 0008
- Feng Jiang 0009
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Junwei Du, Yaoze Liu, Haojie Li, Xu Yu, Zhuo Chen, Feng Jiang:
Multi-view constraint disentangled GAT for recommendation. Neurocomputing 640: 130317 (2025) - [j22]Wei Wei, Haojie Li, Xinshuang Ren, Feng Jiang, Xu Yu, Xingyu Gao, Junwei Du
:
Improving bug triage with the bug personalized tossing relationship. Inf. Softw. Technol. 179: 107642 (2025) - [j21]Haojie Li
, Junwei Du
, Guanfeng Liu
, Feng Jiang
, Yan Wang
, Xiaofang Zhou
:
Intent Propagation Contrastive Collaborative Filtering. IEEE Trans. Knowl. Data Eng. 37(5): 2665-2679 (2025) - [j20]Xu Yu
, Yan Lu, Feng Jiang
, Qiang Hu
, Junwei Du, Dunwei Gong
:
A Cross-Domain Intrusion Detection Method Based on Nonlinear Augmented Explicit Features. IEEE Trans. Netw. Serv. Manag. 22(1): 187-197 (2025) - 2024
- [c12]Haojie Li
, Wei Wei
, Guanfeng Liu
, Jinhuan Liu
, Feng Jiang
, Junwei Du
:
Intent Distribution based Bipartite Graph Representation Learning. SIGIR 2024: 1649-1658 - 2023
- [j19]Xu Yu, Qinglong Peng, Feng Jiang
, Junwei Du, Hongtao Liang, Jinhuan Liu:
Multi-Head Attention and Knowledge Graph Based Dual Target Graph Collaborative Filtering Network. Neural Process. Lett. 55(7): 9155-9177 (2023) - [j18]Junwei Du
, Xinshuang Ren, Haojie Li, Feng Jiang
, Xu Yu:
Prediction of bug-fixing time based on distinguishable sequences fusion in open source software. J. Softw. Evol. Process. 35(11) (2023) - [c11]Jie Yu, Feng Jiang
, Junwei Du, Xu Yu:
A Multi-behavior Recommendation Based on Disentangled Graph Convolutional Networks and Contrastive Learning. ChineseCSCW (1) 2023: 195-207 - 2022
- [j17]Feng Jiang
, Xu Yu, Dunwei Gong, Junwei Du:
A random approximate reduct-based ensemble learning approach and its application in software defect prediction. Inf. Sci. 609: 1147-1168 (2022) - [c10]Wei Wei, Feng Jiang
, Xu Yu, Junwei Du:
An Under-sampling Algorithm Based on Weighted Complexity and Its Application in Software Defect Prediction. ICSIM 2022: 38-44 - [c9]Zhiyong Yang, Feng Jiang
, Xu Yu, Junwei Du:
Initial Seeds Selection for K-means Clustering Based on Outlier Detection. ICSIM 2022: 138-143 - [c8]Zhiyong Yang, Junwei Du, Qiang Hu, Feng Jiang
:
Neighborhood Approximate Reducts-Based Ensemble Learning Algorithm and Its Application in Software Defect Prediction. IJCRS 2022: 100-113 - [c7]Qinglong Peng, Bin Tang, Jinhuan Liu, Shuang Cui, Junwei Du, Yan Lu, Feng Jiang
, Xu Yu:
A Multi-Head Attention Based Dual Target Graph Collaborative Filtering Network. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 476-483 - 2021
- [j16]Feng Jiang
, Xu Yu, Hongbo Zhao, Dunwei Gong, Junwei Du
:
Ensemble learning based on random super-reduct and resampling. Artif. Intell. Rev. 54(4): 3115-3140 (2021) - [j15]Xu Yu
, Qinglong Peng
, Lingwei Xu, Feng Jiang
, Junwei Du, Dunwei Gong:
A selective ensemble learning based two-sided cross-domain collaborative filtering algorithm. Inf. Process. Manag. 58(6): 102691 (2021) - [j14]Feng Jiang
, Xu Yu, Junwei Du, Dunwei Gong, Youqiang Zhang
, Yanjun Peng:
Ensemble learning based on approximate reducts and bootstrap sampling. Inf. Sci. 547: 797-813 (2021) - [c6]Xu Yu, Fayang Wan, Junwei Du, Feng Jiang
, Lantian Guo, Junyu Lin:
Bug Triage Model Considering Cooperative and Sequential Relationship. WASA (2) 2021: 160-172 - 2020
- [c5]Xu Yu, Yadong He, Biao Xu, Junwei Du, Feng Jiang
, Dunwei Gong:
An FM Developer Recommendation Algorithm by Considering Explicit Information and ID Information. ICWS 2020: 49-60
2010 – 2019
- 2019
- [j13]Feng Jiang
, Hongbo Zhao, Junwei Du, Yu Xue, Yanjun Peng:
Outlier detection based on approximation accuracy entropy. Int. J. Mach. Learn. Cybern. 10(9): 2483-2499 (2019) - [j12]Xu Yu
, Feng Jiang
, Junwei Du, Dunwei Gong:
A cross-domain collaborative filtering algorithm with expanding user and item features via the latent factor space of auxiliary domains. Pattern Recognit. 94: 96-109 (2019) - 2018
- [j11]Xu Yu
, Junyu Lin
, Feng Jiang
, Junwei Du
, Jizhong Han:
A Cross-Domain Collaborative Filtering Algorithm Based on Feature Construction and Locally Weighted Linear Regression. Comput. Intell. Neurosci. 2018: 1425365:1-1425365:12 (2018) - [j10]Xu Yu, Yan Chu
, Feng Jiang
, Ying Guo, Dunwei Gong:
SVMs Classification Based Two-side Cross Domain Collaborative Filtering by inferring intrinsic user and item features. Knowl. Based Syst. 141: 80-91 (2018) - [j9]Yuxia Lei
, Yushu Yan, Yonghua Han, Feng Jiang
:
The Hierarchies of Multivalued Attribute Domains and Corresponding Applications in Data Mining. Wirel. Commun. Mob. Comput. 2018: 1789121:1-1789121:11 (2018) - 2017
- [j8]Xu Yu
, Feng Jiang
, Junwei Du, Dunwei Gong:
A User-Based Cross Domain Collaborative Filtering Algorithm Based on a Linear Decomposition Model. IEEE Access 5: 27582-27589 (2017) - [c4]Xu Yu, Feng Jiang
, Miao Yu, Ying Guo:
Cross Domain Collaborative Filtering by Integrating User Latent Vectors of Auxiliary Domains. KSEM 2017: 334-345 - 2016
- [j7]Feng Jiang
, Guozhu Liu, Junwei Du, Yuefei Sui:
Initialization of K-modes clustering using outlier detection techniques. Inf. Sci. 332: 167-183 (2016) - 2015
- [j6]Feng Jiang
, Yumin Chen
:
Outlier detection based on granular computing and rough set theory. Appl. Intell. 42(2): 303-322 (2015) - [j5]Feng Jiang
, Yuefei Sui:
A novel approach for discretization of continuous attributes in rough set theory. Knowl. Based Syst. 73: 324-334 (2015) - [j4]Feng Jiang
, Yuefei Sui, Lin Zhou:
A relative decision entropy-based feature selection approach. Pattern Recognit. 48(7): 2151-2163 (2015) - 2013
- [j3]Feng Jiang
, Yuefei Sui, Cungen Cao:
An incremental decision tree algorithm based on rough sets and its application in intrusion detection. Artif. Intell. Rev. 40(4): 517-530 (2013) - [j2]Feng Jiang
, Xiaoyan Wan, Yuefei Sui, Cungen Cao, Junwei Du:
Relational Operations and Uncertainty Measure in Rough Relational Database. Fundam. Informaticae 123(4): 401-416 (2013) - 2012
- [c3]Hongbo Zhao, Feng Jiang
, Chunping Wang:
An Approximation Decision Entropy Based Decision Tree Algorithm and Its Application in Intrusion Detection. RSKT 2012: 101-106 - 2011
- [j1]Feng Jiang
, Yuefei Sui, Cungen Cao:
A hybrid approach to outlier detection based on boundary region. Pattern Recognit. Lett. 32(14): 1860-1870 (2011) - [c2]Lin Zhou, Feng Jiang
:
A Rough Set Based Decision Tree Algorithm and Its Application in Intrusion Detection. PReMI 2011: 333-338 - [c1]Lin Zhou, Feng Jiang
:
A Rough Set Approach to Feature Selection Based on Relative Decision Entropy. RSKT 2011: 110-119
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-05 22:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint