default search action
Weiwu Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Jinhui Cao, Xiaoqiang Di, Xu Liu, Rui Xu, Jinqing Li, Weiwu Ren, Hui Qi, Pengfei Hu, Kehan Zhang, Bo Li:
Towards robust log parsing using self-supervised learning for system security analysis. Intell. Data Anal. 28(4): 1093-1113 (2024) - [j11]Weiwu Ren, Yuan Gao, Xiao Chen, Hongbing Chen:
Research on satellite link allocation algorithm for Earth-Moon space information network. J. Supercomput. 80(16): 23689-23711 (2024) - 2023
- [j10]Weiwu Ren, Xintong Song, Yu Hong, Ying Lei, Jinyu Yao, Yazhou Du, Wenjuan Li:
APT Attack Detection Based on Graph Convolutional Neural Networks. Int. J. Comput. Intell. Syst. 16(1): 184 (2023) - [j9]Hui Qi, Junrui Si, Jiahui Hou, Zhe Tian, Aowei Zhang, Jing Chen, Weiwu Ren, Shiwei Zhang, Xiaoqiang Di:
Subflow scheduling strategy for multipath transmission in SDN-based spatial network. Wirel. Networks 29(2): 941-953 (2023) - [c7]Jinyao Liu, Xiaoqiang Di, Weiwu Ren, Ligang Cong, Hui Qi:
MPQUIC Transmission Control Strategy for SDN-Based Satellite Network. ICA3PP (6) 2023: 453-464 - 2022
- [j8]Hui Qi, Yingjun Guo, Dinghui Hou, Ziyang Xing, Weiwu Ren, Ligang Cong, Xiaoqiang Di:
SDN-based dynamic multi-path routing strategy for satellite networks. Future Gener. Comput. Syst. 133: 254-265 (2022) - [j7]Weiwu Ren, Jialin Zhu, Hui Qi, Ligang Cong, Xiaoqiang Di:
Dynamic optimization of intersatellite link assignment based on reinforcement learning. Int. J. Distributed Sens. Networks 18(2): 155014772110702 (2022) - 2021
- [j6]Zhen Liu, Xiaoqiang Di, Wei Song, Weiwu Ren:
A Sentence-Level Joint Relation Classification Model Based on Reinforcement Learning. Comput. Intell. Neurosci. 2021: 5557184:1-5557184:10 (2021) - [j5]Xu Liu, Weiyou Liu, Xiaoqiang Di, Jinqing Li, Binbin Cai, Weiwu Ren, Huamin Yang:
LogNADS: Network anomaly detection scheme based on log semantics representation. Future Gener. Comput. Syst. 124: 390-405 (2021) - [c6]Zhen Liu, Xiaoqiang Di, Wei Song, Weiwu Ren:
Vulnerability knowledge extraction method based on joint extraction model. CBD 2021: 101-106 - [c5]Luyue Fang, Xiaoqiang Di, Xu Liu, Yiping Qin, Weiwu Ren, Qiang Ding:
QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity. TrustCom 2021: 1085-1092 - 2020
- [j4]Weiwu Ren, Jianfei Zhang, Xiaoqiang Di, Yinan Lu, Bochen Zhang, Jianping Zhao:
Anomaly Detection Algorithm Based on CFSFDP. J. Adv. Comput. Intell. Intell. Informatics 24(4): 453-460 (2020)
2010 – 2019
- 2019
- [c4]Ying Zhou, Xiaoqiang Di, Ligang Cong, Weiwu Ren, Weiyou Liu, Yuming Jiang, Huilin Jiang:
Performance Analysis of Three-Layered Satellite Network Based on Stochastic Network Calculus. CSPS 2019: 2285-2294 - 2017
- [j3]Bing Jia, Shuai Liu, Yushuai Guan, Wuyungerile Li, Weiwu Ren:
The Fusion Model of Multidomain Context Information for the Internet of Things. Wirel. Commun. Mob. Comput. 2017 (2017) - [c3]Jianfei Zhang, Weiwu Ren, Guannan Qu:
An Improved Interconnection Network for Data Center Based on BCube Structure. GSKI (1) 2017: 601-607 - [c2]Jianfei Zhang, Weiwu Ren, Guannan Qu:
Constructing Algorithm of MLMS Data Center Network. GSKI (1) 2017: 629-636 - 2013
- [j2]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu, Bing Jia:
Intrusion Classifier based on Multiple Attribute Selection Algorithms. J. Comput. 8(10): 2536-2543 (2013) - [j1]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu:
An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering. J. Networks 8(3): 672-679 (2013)
2000 – 2009
- 2008
- [c1]Fei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren:
Using Density-Based Incremental Clustering for Anomaly Detection. CSSE (3) 2008: 986-989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint