共 50 条
- [2] Growth Scheduling and Processing in Cyber-I Modeling [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 1267 - 1272
- [3] Awareness and Control of Personal Data Based on the Cyber-I Privacy Model [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 456 - 463
- [4] Cyber-I: Vision of the Individual's Counterpart on Cyberspace [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 295 - +
- [5] Me, Myself, & Cyber-I: A Craft Analysis of Narrative Persona in Creative Nonfiction [J]. NEW WRITING-THE INTERNATIONAL JOURNAL FOR THE PRACTICE AND THEORY OF CREATIVE WRITING, 2015, 12 (02): : 193 - 204
- [6] From User Models to the Cyber-I Model: Approaches, Progresses and Issues [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 33 - 40
- [7] Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing Logs [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 26 - 32
- [8] Malicious Behavior Analysis of Android GUI Based on ADB [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 147 - 153
- [9] Privacy-preserved and Best-effort Provisions of Cyber-I Information to Personalized Services [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 218 - 225
- [10] LSTM Android Malicious Behavior Analysis Based on Feature Weighting [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (06): : 2188 - 2203