Follow
Jinyan Wang
Jinyan Wang
Guangxi Normal University
Verified email at gxnu.edu.cn
Title
Cited by
Cited by
Year
A perturb biogeography based optimization with mutation for global numerical optimization
X Li, J Wang, J Zhou, M Yin
Applied Mathematics and Computation 218 (2), 598-609, 2011
1062011
Two privacy-preserving approaches for publishing transactional data streams
J Wang, C Deng, X Li
IEEE Access 6, 23648-23658, 2018
352018
Fuzzy multiset finite automata and their languages
J Wang, M Yin, W Gu
Soft Computing 17, 381-390, 2013
332013
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu
Journal of Real-Time Image Processing 16, 709-724, 2019
272019
Two privacy-preserving approaches for data publishing with identity reservation
J Wang, K Du, X Luo, X Li
Knowledge and Information Systems 60, 1039-1080, 2019
232019
Soft polygroups
J Wang, M Yin, W Gu
Computers & Mathematics with Applications 62 (9), 3529-3537, 2011
222011
Two approximate algorithms for model counting
J Wang, M Yin, J Wu
Theoretical Computer Science 657, 28-37, 2017
162017
A three-phase approach to differentially private crucial patterns mining over data streams
J Wang, C Liu, X Fu, X Luo, X Li
Computers & Security 82, 30-48, 2019
132019
Differentially private ensemble learning for classification
X Li, J Liu, S Liu, J Wang
Neurocomputing 430, 34-46, 2021
122021
Identifying mutated driver pathways in cancer by integrating multi-omics data
J Wu, Q Cai, J Wang, Y Liao
Computational biology and chemistry 80, 159-167, 2019
112019
Phase transitions of EXPSPACE-complete problems: a further step
J Zhou, M Yin, X Li, J Wang
International Journal of Foundations of Computer Science 23 (01), 173-184, 2012
112012
Differential privacy preservation in interpretable feedforward-designed convolutional neural networks
J Wang, Z Tan, X Li, Y Hu
2020 IEEE 19th international conference on trust, security and privacy in …, 2020
102020
A privacy preservation framework for feedforward-designed convolutional neural networks
D Li, J Wang, Q Li, Y Hu, X Li
Neural Networks 155, 14-27, 2022
82022
A novel watermarking algorithm based on phase congruency corner detection and SVD
W Wang, J Wang, C Wang, D Pu
2010 Fifth International Conference on Frontier of Computer Science and …, 2010
82010
Some new results on soft hypermodules.
J Wang, J Zhan, W Gu
Ars Comb. 104, 289-306, 2012
72012
SSGD: A safe and efficient method of gradient descent
J Duan, X Li, S Gao, Z Zhong, J Wang
Security and Communication Networks 2021, 1-11, 2021
62021
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams
J Wang, S Fang, C Liu, J Qin, X Li, Z Shi
Future Generation Computer Systems 111, 339-351, 2020
62020
Differentially private frequent episode mining over event streams
J Qin, J Wang, Q Li, S Fang, X Li, L Lei
Engineering Applications of Artificial Intelligence 110, 104681, 2022
52022
IDM-SPS: Identifying driver module with somatic mutation, ppi network and subcellular localization
J Wu, J Yang, G Li, J Wang
Engineering Applications of Artificial Intelligence 106, 104482, 2021
52021
Solving quantified constraint satisfaction problems with value selection rules
J Gao, J Wang, K Wu, R Chen
Frontiers of Computer Science 14, 1-11, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20