


Остановите войну!
for scientists:
Zhoujun Li
Zhou-Jun Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Zhoujun Li 0001
— Beihang University, State Key Lab of Software Development Environment, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c84]Xinyu Pi, Bing Wang, Yan Gao, Jiaqi Guo, Zhoujun Li, Jian-Guang Lou:
Towards Robustness of Text-to-SQL Models Against Natural and Realistic Adversarial Table Perturbation. ACL (1) 2022: 2007-2022 - [i8]Hongcheng Guo, Xingyu Lin, Jian Yang, Yi Zhuang, Jiaqi Bai, Tieqiao Zheng, Bo Zhang, Zhoujun Li:
TransLog: A Unified Transformer-based Framework for Log Anomaly Detection. CoRR abs/2201.00016 (2022) - 2021
- [j38]Liqun Yang, You Zhai, Zhoujun Li:
Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder. J. Netw. Comput. Appl. 193: 103178 (2021) - [c83]Jian Yang, Yuwei Yin, Shuming Ma, Haoyang Huang, Dongdong Zhang, Zhoujun Li, Furu Wei:
Multilingual Agreement for Multilingual Neural Machine Translation. ACL/IJCNLP (2) 2021: 233-239 - [c82]Tongliang Li, Lei Fang, Jian-Guang Lou, Zhoujun Li:
TWT: Table with Written Text for Controlled Data-to-Text Generation. EMNLP (Findings) 2021: 1244-1254 - [c81]Jian Yang, Shuming Ma, Dongdong Zhang, Juncheng Wan, Zhoujun Li, Ming Zhou:
Smart-Start Decoding for Neural Machine Translation. NAACL-HLT 2021: 3982-3988 - [c80]Jian Yang, Juncheng Wan, Shuming Ma, Haoyang Huang, Dongdong Zhang, Yong Yu, Zhoujun Li, Furu Wei:
Learning to Select Relevant Knowledge for Neural Machine Translation. NLPCC (1) 2021: 79-91 - [c79]Tongliang Li, Lei Fang, Jian-Guang Lou, Zhoujun Li, Dongmei Zhang:
AnaSearch: Extract, Retrieve and Visualize Structured Results from Unstructured Text for Analytical Queries. WSDM 2021: 906-909 - [i7]Minghao Li, Tengchao Lv, Lei Cui, Yijuan Lu, Dinei A. F. Florêncio, Cha Zhang, Zhoujun Li, Furu Wei:
TrOCR: Transformer-based Optical Character Recognition with Pre-trained Models. CoRR abs/2109.10282 (2021) - 2020
- [j37]Zhoujun Li, Yu Fan, Xianjie Wu:
面向自然语言处理的预训练技术研究综述 (Survey of Natural Language Processing Pre-training Techniques). 计算机科学 47(3): 162-173 (2020) - [c78]Jian Yang, Shuming Ma, Dongdong Zhang, Shuangzhi Wu, Zhoujun Li, Ming Zhou:
Alternating Language Modeling for Cross-Lingual Pre-Training. AAAI 2020: 9386-9393 - [c77]Jian Yang, Shuming Ma, Dongdong Zhang, Zhoujun Li, Ming Zhou:
Improving Neural Machine Translation with Soft Template Prediction. ACL 2020: 5979-5989 - [c76]Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li:
Super Root: A New Stealthy Rooting Technique on ARM Devices. ACNS (2) 2020: 344-363 - [c75]Minghao Li, Yiheng Xu
, Lei Cui, Shaohan Huang, Furu Wei, Zhoujun Li, Ming Zhou:
DocBank: A Benchmark Dataset for Document Layout Analysis. COLING 2020: 949-960 - [c74]Tianyang Zhao
, Haoyan Liu, Qianhui Wu, Changzhi Sun, Dongdong Zhang, Zhoujun Li:
BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition. DASFAA (1) 2020: 502-518 - [c73]Jiaming Sun, Yunli Wang, Zhoujun Li:
An Improved Template Representation-based Transformer for Abstractive Text Summarization. IJCNN 2020: 1-8 - [c72]Minghao Li, Lei Cui, Shaohan Huang, Furu Wei, Ming Zhou, Zhoujun Li:
TableBank: Table Benchmark for Image-based Table Detection and Recognition. LREC 2020: 1918-1925 - [c71]Yunchu Gao, Ke Zhang, Zhoujun Li:
Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge. NLPCC (2) 2020: 132-143 - [i6]Ze Yang, Wei Wu, Huang Hu, Can Xu, Zhoujun Li:
Open Domain Dialogue Generation with Latent Images. CoRR abs/2004.01981 (2020) - [i5]Minghao Li, Yiheng Xu, Lei Cui, Shaohan Huang, Furu Wei, Zhoujun Li, Ming Zhou:
DocBank: A Benchmark Dataset for Document Layout Analysis. CoRR abs/2006.01038 (2020) - [i4]Daisheng Jin, Xiao Ma, Chongzhi Zhang, Yizhuo Zhou, Jiashu Tao, Mingyuan Zhang, Haiyu Zhao, Shuai Yi, Zhoujun Li, Xianglong Liu, Hongsheng Li:
Towards Overcoming False Positives in Visual Relationship Detection. CoRR abs/2012.12510 (2020)
2010 – 2019
- 2019
- [j36]Zhoujun Li, Changbao Wang:
基于深度学习的机器阅读理解综述 (Survey on Deep-learning-based Machine Reading Comprehension). 计算机科学 46(7): 7-12 (2019) - [c70]Haoyan Liu, Lei Fang, Jian-Guang Lou, Zhoujun Li:
Leveraging Web Semantic Knowledge in Word Representation Learning. AAAI 2019: 6746-6753 - [c69]Haoyan Liu, Lei Fang, Qian Liu, Bei Chen, Jian-Guang Lou, Zhoujun Li:
Leveraging Adjective-Noun Phrasing Knowledge for Comparison Relation Prediction in Text-to-SQL. EMNLP/IJCNLP (1) 2019: 3513-3518 - [i3]Minghao Li, Lei Cui, Shaohan Huang, Furu Wei, Ming Zhou, Zhoujun Li:
TableBank: Table Benchmark for Image-based Table Detection and Recognition. CoRR abs/1903.01949 (2019) - 2018
- [j35]Dong Shen
, Zhoujun Li, Xiaojing Su, Jinxin Ma, Robert Huijie Deng
:
TinyVisor: An extensible secure framework on android platforms. Comput. Secur. 72: 145-162 (2018) - [j34]Hua Guo, Yandong Zheng, Xiong Li
, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. Future Gener. Comput. Syst. 89: 713-721 (2018) - [j33]Ahmed Ktob
, Zhoujun Li:
Marefa: Turning Publishers Catalogs' Data Into Linked Data. Int. J. Semantic Web Inf. Syst. 14(3): 167-183 (2018) - [c68]Ruixue Ding, Zhoujun Li:
Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer. ADMA 2018: 189-201 - [c67]Zhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma:
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices. DSC 2018: 325-332 - [c66]Longbin Zhou, Zhoujun Li:
Fuzz Testing Based on Virtualization Technology. ICCAI 2018: 57-61 - [c65]Jian Yang, Shuangzhi Wu, Dongdong Zhang, Zhoujun Li, Ming Zhou:
Improved Neural Machine Translation with Chinese Phonologic Features. NLPCC (1) 2018: 303-315 - 2017
- [c64]Zhangkai Zhang, Xuhua Ding
, Gene Tsudik, Jinhua Cui, Zhoujun Li:
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. CCS 2017: 89-102 - [c63]Ahmed Ktob
, Zhoujun Li, Djelloul Bouchiha
:
Extracting Linked Data from HTML Tables. CIC 2017: 48-53 - [c62]Dong Shen, Xiaojing Su, Zhoujun Li:
HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. CSS 2017: 199-214 - [c61]Ming Yuan, Ye Li, Zhoujun Li:
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. ICICS 2017: 363-373 - [c60]Ahmed Ktob
, Zhoujun Li:
The Arabic Knowledge Graph: Opportunities and Challenges. ICSC 2017: 48-52 - 2016
- [j32]Xiong Zhang, Zhoujun Li:
模糊测试技术研究综述 (Survey of Fuzz Testing Technology). 计算机科学 43(5): 1-8 (2016) - [j31]Yan Zhang, Zhoujun Li, Guowei Dong, Dianfu Ma:
一种基于三维树模型的源代码安全缺陷分类方法 (Novel Taxonomy of Security Weakness in Source Code Based on Three-dimension Tree Model). 计算机科学 43(5): 76-79 (2016) - [j30]Feng Li, Jinzhu Huang, Zhoujun Li, Weiming Yang:
一种领域语料驱动的句子相关性计算方法研究 (Study on Domain-corpus Driven Calculation Method of Sentence Relevance). 计算机科学 43(5): 188-192 (2016) - [j29]Yan Zhang, Zhoujun Li, Dianfu Ma:
A Model Guided Security Analysis Approach for Android Applications. J. Softw. 11(7): 677-684 (2016) - [j28]Hua Guo, Yandong Zheng, Xiyong Zhang, Zhoujun Li:
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks. Sensors 16(5): 609 (2016) - [c59]Dong Shen, Zhangkai Zhang, Xuhua Ding
, Zhoujun Li, Robert H. Deng
:
H-Binder: A Hardened Binder Framework on Android Systems. SecureComm 2016: 24-43 - 2015
- [j27]Chang Xu, Liehuang Zhu, Zhoujun Li, Feng Wang:
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority. Comput. J. 58(10): 2509-2519 (2015) - [j26]Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu:
Transferable conditional e-cash with optimal anonymity in the standard model. IET Inf. Secur. 9(1): 59-72 (2015) - [j25]Jinsong Yuan, Xiaoming Zhang, Zhoujun Li:
术语自动抽取方法研究综述 (Survey of Automatic Terminology Extraction Methodologies). 计算机科学 42(8): 7-12 (2015) - [j24]Kang Liu, Zhoujun Li, Xiaoming Zhang:
基于Web数据的实证研究:城市轨道交通对住宅价格的时空效应分析 (Empirical Research Based on Web Data: An Analysis on Spatio-temporal Effect of City Rail Transit on Residential House Prices). 计算机科学 42(9): 199-203 (2015) - [j23]Jie Yu, Qiang Li, Shasha Li, Jun Ma, Zhoujun Li:
基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks). 计算机科学 42(Z6): 263-265 (2015) - [j22]Hua Guo, Yandong Zheng, Biao Wang, Zhoujun Li:
A Note on an Improved Self-Healing Group Key Distribution Scheme. Sensors 15(10): 25033-25038 (2015) - [c58]Enguang Zhou, Jiangxiao Zhang, Zhoujun Li, Chang Xu:
Integrity Verification of Replicated File with Proxy in Cloud Computing. CloudCom-Asia 2015: 344-353 - [c57]Junxian Zhang, Zhoujun Li, Xianchen Zheng:
PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation. SETTA 2015: 227-242 - [c56]Huikang Hao, Zhoujun Li, Haibo Yu:
An Effective Approach to Measuring and Assessing the Risk of Android Application. TASE 2015: 31-38 - [c55]Jiangxiao Zhang, Lina Huo, Xia Liu, Chunrong Sui, Zhoujun Li, Jinxin Ma:
Transferable Optimal-size Fair E-cash with Optimal Anonymity. TASE 2015: 139-142 - 2014
- [j21]Chang Xu, Hua Guo, Zhoujun Li, Yi Mu:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature. Comput. J. 57(10): 1580-1590 (2014) - [c54]Enguang Zhou, Zhoujun Li:
An Improved Remote Data Possession Checking Protocol in Cloud Storage. ICA3PP (2) 2014: 611-617 - [c53]Qiang Li, Jie Yu, Zhoujun Li:
Routing table status influence of Monitoring Kad. ICPADS 2014: 837-841 - [c52]Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia:
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. INTRUST 2014: 127-136 - [c51]Qiang Li, Jie Yu, Zhoujun Li:
An Enhanced Kad Protocol Resistant to Eclipse Attacks. NAS 2014: 83-87 - [i2]Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li:
Fair Multiple-bank E-cash in the Standard Model. IACR Cryptol. ePrint Arch. 2014: 1007 (2014) - 2013
- [j20]Chang Xu, Hua Guo, Zhoujun Li, Yi Mu:
New construction of affiliation-hiding authenticated group key agreement. Secur. Commun. Networks 6(6): 723-734 (2013) - [j19]Shasha Li, Chin-Yew Lin, Young-In Song, Zhoujun Li:
Comparable Entity Mining from Comparative Questions. IEEE Trans. Knowl. Data Eng. 25(7): 1498-1509 (2013) - [c50]Jiangxiao Zhang, Zhoujun Li, Hua Guo:
Multiple-Bank E-Cash without Random Oracles. CSS 2013: 40-51 - [c49]Jiangxiao Zhang, Zhoujun Li, Hua Guo, Chang Xu:
Efficient Divisible E-Cash in the Standard Model. GreenCom/iThings/CPScom 2013: 2123-2128 - [c48]Fan Zhang, Hua Guo, Zhoujun Li:
Ancestor Excludable Hierarchical ID-Based Encryption Revisited. NSS 2013: 663-670 - [i1]Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu:
Optimally Anonymous and Transferable Conditional E-cash. IACR Cryptol. ePrint Arch. 2013: 443 (2013) - 2012
- [j18]Hua Guo, Chang Xu, Yi Mu, Zhoujun Li:
A provably secure authenticated key agreement protocol for wireless communications. Comput. Electr. Eng. 38(3): 563-572 (2012) - [j17]Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo:
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. Comput. J. 55(10): 1180-1191 (2012) - [c47]Yi Wang, Zhoujun Li:
SQL Injection Detection via Program Tracing and Machine Learning. IDCS 2012: 264-274 - [c46]Jiangxiao Zhang, Zhoujun Li, Hua Guo:
Anonymous Transferable Conditional E-cash. SecureComm 2012: 45-60 - [c45]Chaojian Hu, Zhoujun Li, Jinxin Ma, Tao Guo, Zhiwei Shi:
File Parsing Vulnerability Detection with Symbolic Execution. TASE 2012: 135-142 - [c44]Yi Wang, Zhoujun Li, Tao Guo, Zhiwei Shi:
FSMesh - Flexibly Securing Mashups by User Defined DOM Environment. WEBIST 2012: 96-102 - 2011
- [j16]Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li:
An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments. Comput. J. 54(6): 905-919 (2011) - [j15]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang
:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [j14]Hua Guo, Zhoujun Li, Yi Mu, Fan Zhang, Chuankun Wu, Jikai Teng:
An efficient dynamic authenticated key exchange protocol with selectable identities. Comput. Math. Appl. 61(9): 2518-2527 (2011) - [j13]Jie Yu, Liming Lu, Peng Xiao, Zhoujun Li, Yuan Zhou:
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT. Comput. Commun. 34(13): 1622-1629 (2011) - [j12]Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang:
An efficient and non-interactive hierarchical key agreement protocol. Comput. Secur. 30(1): 28-34 (2011) - [j11]Jie Yu, Peng Xiao, Zhoujun Li, Yuan Zhou:
Toward an Accurate Snapshot of DHT Networks. IEEE Commun. Lett. 15(1): 97-99 (2011) - [j10]Shasha Li, Zhoujun Li:
Question-Oriented Answer Summarization via Term Hierarchical Structure. Int. J. Softw. Eng. Knowl. Eng. 21(6): 877-889 (2011) - [j9]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Inf. Sci. 181(3): 628-647 (2011) - [j8]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Authenticated key exchange protocol with selectable identities. Wirel. Commun. Mob. Comput. 11(2): 226-239 (2011) - [c43]Yi Wang, Zhoujun Li, Tao Guo:
Program Slicing Stored XSS Bugs in Web Application. TASE 2011: 191-194 - 2010
- [j7]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. Int. J. Secur. Networks 5(2/3): 173-187 (2010) - [c42]Shasha Li, Chin-Yew Lin, Young-In Song, Zhoujun Li:
Comparable Entity Mining from Comparative Questions. ACL 2010: 650-658 - [c41]Wei Liu, Zhoujun Li:
A Tree Graph Model Based on Mobile Environment. AINA 2010: 584-591 - [c40]Shasha Li, Zhoujun Li:
Answer summarization via term hierarchical structure. FSKD 2010: 2349-2353 - [c39]Ahmed Aftab, Zhoujun Li:
Solving Course Timetabling Problem Using Interrelated Approach. GrC 2010: 651-655 - [c38]Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, Jinshu Su
:
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks. ICPP 2010: 680-689 - [c37]Wei Liu, Zhoujun Li:
A Method for Mobile User Profile and Reasoning. PRICAI 2010: 170-181
2000 – 2009
- 2009
- [j6]Song Lin, Biao Wang, Zhoujun Li:
Digital multisignature on the generalized conic curve over Zn. Comput. Secur. 28(1-2): 100-104 (2009) - [j5]Xuewang Zhang, Zhoujun Li, Wei Shen:
Design of Collaborative Platform on Clustering Applications for Governments. Intell. Inf. Manag. 1(1): 30-35 (2009) - [c36]Shikun Chen, Zhoujun Li:
Simplifying Buffer Overflow Detection Using Site-Safe Expressions. ACIS-ICIS 2009: 977-982 - [c35]Jie Yu, Zhoujun Li:
Active Measurement of Routing Table in Kad. CCNC 2009: 1-5 - [c34]Junwan Liu, Zhoujun Li, Yiming Chen:
Microarray Data Biclustering with Multi-objective Immune Optimization Algorithm. ICNC (1) 2009: 200-204 - [c33]Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li:
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Infoscale 2009: 175-191 - [c32]Yiming Chen, Zhoujun Li, Junwan Liu:
Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction. ISNN (3) 2009: 694-703 - [c31]Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li:
An Efficient Certificateless Encryption Scheme in the Standard Model. NSS 2009: 302-309 - [c30]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang
, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - [c29]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Server-Controlled Identity-Based Authenticated Key Exchange. ProvSec 2009: 214-229 - [c28]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. UIC 2009: 310-324 - 2008
- [j4]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 27(1-2): 16-21 (2008) - [j3]Zhoujun Li, Hua Guo, Xiyong Zhang:
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol. Electron. Notes Theor. Comput. Sci. 212: 257-268 (2008) - [j2]Li-Juan Zhang, Zhou-Jun Li, Huo-Wang Chen:
Handling gene redundancy in microarray data using Grey Relational Analysis. Int. J. Data Min. Bioinform. 2(2): 134-144 (2008) - [c27]Junwan Liu, Zhoujun Li, Feifei Liu, Yiming Chen:
Multi-objective Particle Swarm Optimization Biclustering of Microarray Data. BIBM 2008: 363-366 - [c26]Yangli Jia, Zhoujun Li, Zhenling Zhang:
Timed Component-Interaction Automata for Specification and Verification of Real-Time Reactive Systems. CSSE (2) 2008: 135-138 - [c25]Jian Wen, Zhoujun Li:
Improving Information Retrieval within Language Model Framework by Integrating Adjacent and Distant Relation. FSKD (4) 2008: 186-192 - [c24]Jian Wen, Zhoujun Li:
Research on Mixture Language Model-based Document Clustering. GrC 2008: 649-652 - [c23]Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li:
VM-based Architecture for Network Monitoring and Analysis. ICYCS 2008: 1395-1400 - [c22]Song Lin, Biao Wang, Zhoujun Li:
A Digital Signature Scheme on the Conic Curve over Zn Based on Two Hard Problems. PACIIA (1) 2008: 808-811 - 2007
- [c21]Chunming Gao, Jin Li, Zhoujun Li, Huowang Chen:
Model Checking for BPEL4WS with Time. APWeb/WAIM Workshops 2007: 528-533 - [c20]Zhoujun Li, Tao Wang, Ruoxue Wang, Yuejin Yan, Huowang Chen:
A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees. FAW 2007: 216-227 - [c19]Yun Sun, Zhoujun Li, Deqiang Wang:
Hamiltonian Property on Binary Recursive Networks. FAW 2007: 228-235 - [c18]Jian Wen, Zhoujun Li:
Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification. GrC 2007: 648- - [c17]Tao Wang, Zhoujun Li, Yuejin Yan, Huowang Chen:
A Survey of Fuzzy Decision Tree Classifier Methodology. ICFIE 2007: 959-968 - [c16]Zhoujun Li, Yun Sun, Deqiang Wang:
Diameter bounds of cubelike recursive networks. ICPADS 2007: 1-8 - [c15]Yun Sun, Zhoujun Li, Deqiang Wang:
Hamiltonicity and Pancyclicity of Binary Recursive Networks. ISPA 2007: 786-796 - [c14]Tao Wang, Zhoujun Li, Yuejin Yan, Huowang Chen:
An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams. MLDM 2007: 91-103 - [c13]Wen-Han Chao, Zhou-Jun Li:
Incorporating constituent structure constraint into discriminative word alignment. MTSummit 2007 - [c12]Lijuan Zhang, Zhoujun Li, Huowang Chen:
An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix. PAKDD 2007: 1088-1095 - [c11]