Showing results 17 to 27 of 27
< previous
Issue Date | Title | Author(s) |
2022-05-24 | NaturalCC: An Open-Source Toolkit for Code Intelligence | Wan, Y; He, Y; Bi, Z; Zhang, J; Sui, Y; Zhang, H; Hashimoto, K; Jin, H; Xu, G; Xiong, C; Yu, PS |
2018-06-01 | A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks | Yuan, B; Jin, H; Zou, D; Yang, LT; Yu, S |
2021-11 | Resilient NdFeB magnet recycling under the impacts of COVID-19 pandemic: Stochastic programming and Benders decomposition | Cheramin, M; Saha, AK; Cheng, J; Paul, SK; Jin, H |
2023-07-01 | Resource investment for DDoS attack resistant SDN: a practical assessment | Yuan, B; Zhang, F; Wan, J; Zhao, H; Yu, S; Zou, D; Hua, Q; Jin, H |
2023-11-30 | RETIA: relation-entity twin-interact aggregation for temporal knowledge graph extrapolation | Liu, K; Zhao, F; Xu, G; Wang, X; Jin, H |
2018-06-22 | Seamless Upscaling of the Field-Measured Grassland Aboveground Biomass Based on Gaussian Process Regression and Gap-Filled Landsat 8 OLI Reflectance | Yin, G; Li, A; Wu, C; Wang, J; Xie, Q; Zhang, Z; Nan, X; Jin, H; Bian, J; Lei, G |
2016-09-10 | Taming transitive permission attack via bytecode rewriting on Android application | Wang, D; Jin, H; Zou, D; Xu, P; Zhu, T; Chen, G |
2022-12-31 | Temporal knowledge graph reasoning via time-distributed representation learning | Liu, K; Zhao, F; Xu, G; Wang, X; Jin, H |
2022-01-01 | What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code | Wan, Y; Zhao, W; Zhang, H; Sui, Y; Xu, G; Jin, H |
2022-11-07 | You see what I want you to see: poisoning vulnerabilities in neural code search | Wan, Y; Zhang, S; Zhang, H; Sui, Y; Xu, G; Yao, D; Jin, H; Sun, L |
2016-12-01 | ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets | Pang, G; Ting, KM; Albrecht, D; Jin, H |