Issue Date | Title | Author(s) |
2019 | HERS: Modeling Influential Contexts with Heterogeneous Relations for Sparse and Cold-Start Recommendation | Cao, L; Hu, L; Jian, S; Gu, Z; Chen, Q; Amirbekyan, A |
2017-11-01 | Recent advances in sequence assembly: Principles and applications | Chen, Q; Lan, C; Zhao, L; Wang, J; Chen, B; Chen, YPP |
2008-09-01 | Rule-based dependency models for security protocol analysis | Chen, Q; Zhang, S; Chen, YPP |
2006-07-06 | Detecting collusion attacks in security protocols | Chen, Q; Chen, YPP; Zhang, S; Zhang, C |
2019-06-14 | Viral integration drives multifocal HCC during the occult HBV infection | Chen, XP; Long, X; Jia, WL; Wu, HJ; Zhao, J; Liang, HF; Laurence, A; Zhu, J; Dong, D; Chen, Y; Lin, L; Xia, YD; Li, WY; Li, GB; Zhao, ZK; Wu, K; Hou, Y; Yu, JJ; Xiao, W; Wang, GP; Zhu, PC; Chen, W; Bai, MZ; Jian, YX; Kristiansen, K; Chen, Q |
2017-11-01 | Using propensity scores to predict the kinases of unannotated phosphopeptides | Chen, Q; Wang, Y; Chen, B; Zhang, C; Wang, L; Li, J |
2005-01-01 | ENDL: A logical framework for verifying secure transaction protocols | Chen, Q; Zhang, C; Zhang, S |
2013-01-01 | A confidence-based filtering method for DDoS attack defense in cloud environment | Dou, W; Chen, Q; Chen, J |
2014-02-10 | Intelligent strategies for pathway mining model and pattern identification | Chen, Q; Chen, B; Zhang, C |
2007-10-01 | Detecting inconsistency in biological molecular databases using ontologies | Chen, Q; Chen, YPP; Zhang, C |