Follow
Weimin Li(李卫民)
Weimin Li(李卫民)
School of Computer Engineering and Science,Shanghai University
Verified email at shu.edu.cn
Title
Cited by
Cited by
Year
Hierarchical Adversarial Attacks Against Graph Neural Network Based IoT Network Intrusion Detection System
X Zhou, W Liang, W Li, K Yan, S Shimizu, I Kevin, K Wang
IEEE Internet of Things Journal, 2021
352021
An overlapping network community partition algorithm based on semi-supervised matrix factorization and random walk
W Li, J Xie, M Xin, J Mo
Expert Systems with Applications 91, 277-285, 2018
282018
Applications of AR*-GRNN model for financial time series forecasting
W Li, Y Luo, Q Zhu, J Liu, J Le
Neural Computing and Applications 17 (5-6), 441-448, 2008
282008
Personalized fitting recommendation based on support vector regression
W Li, X Li, M Yao, J Jiang, Q Jin
Human-centric computing and information sciences 5 (1), 1-11, 2015
252015
Multi-objective data placement for workflow management in cloud infrastructure using NSGA-II
X Xu, S Fu, W Li, F Dai, H Gao, V Chang
IEEE Transactions on Emerging Topics in Computational Intelligence 4 (5 …, 2020
232020
Social recommendation based on trust and influence in SNS environments
W Li, Z Ye, M Xin, Q Jin
Multimedia Tools and Applications 76 (9), 11585-11602, 2017
212017
A location-context awareness mobile services collaborative recommendation algorithm based on user behavior prediction
M Xin, Y Zhang, S Li, L Zhou, W Li
International Journal of Web Services Research (IJWSR) 14 (2), 45-66, 2017
202017
Overlap community detection using spectral algorithm based on node convergence degree
W Li, S Jiang, Q Jin
Future Generation Computer Systems 79, 408-416, 2018
192018
A Dynamic Algorithm based on Cohesive Entropy for Influence Maximization in Social Networks
W Li, K Zhong, J Wang, D Chen
Expert Systems with Applications, 114207, 2020
182020
Effective community division based on improved spectral clustering
Y Xu, Z Zhuang, W Li, X Zhou
Neurocomputing 279, 54-62, 2018
142018
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
W Lin, X Zhang, L Qi, W Li, S Li, VS Sheng, S Nepal
IEEE Transactions on Computational Social Systems, 2020
132020
Structure and theory of dual-space storage for ternary optical computer
S OUYANG, J PENG, Y JIN, Y SHEN, X LIU, W LI
SCIENTIA SINICA Informationis 46 (6), 743-762, 2016
132016
A public opinion classification algorithm based on micro-blog text sentiment intensity: design and implementation
X Mingjun, H Wu, W Li, N Zhihua
International Journal of Computer Network and Information Security 3 (3), 48, 2011
132011
Personalization recommendation algorithm based on trust correlation degree and matrix factorization
W Li, X Zhou, S Shimizu, M Xin, J Jiang, H Gao, Q Jin
IEEE Access 7, 45451-45459, 2019
122019
Influence maximization algorithm based on Gaussian propagation model
WM Li, Z Li, AM Luvembe, C Yang
Information Sciences 568, 386-402, 2021
112021
Identity authentication on mobile devices using face verification and ID image recognition
X Wu, J Xu, J Wang, Y Li, W Li, Y Guo
Procedia Computer Science 162, 932-939, 2019
112019
The financial time series forecasting based on proposed ARMA-GRNN model
WM Li, JW Liu, JJ Le, XR Wang
2005 International Conference on Machine Learning and Cybernetics 4, 2005
112005
Information diffusion across cyber-physical-social systems in smart city: A survey
X Zhou, S Li, Z Li, W Li
Neurocomputing 444, 203-213, 2021
102021
Three-hop velocity attenuation propagation model for influence maximization in social networks
W Li, Y Fan, J Mo, W Liu, C Wang, M Xin, Q Jin
World Wide Web 23 (2), 1261-1273, 2020
102020
A fault‐tolerant dynamic scheduling method on hierarchical mobile edge cloud computing
S Meng, Q Li, T Wu, W Huang, J Zhang, W Li
Computational Intelligence 35 (3), 577-598, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20