Jiang Zhong
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j7]Qi Li, Jiang Zhong, Qing Li, Chen Wang, Zehong Cao:
A Community Merger of Optimization Algorithm to Extract Overlapping Communities in Networks. IEEE Access 7: 3994-4005 (2019) - [j6]Qi Li, Zehong Cao, Jiang Zhong, Qing Li:
Graph representation learning with encoding edges. Neurocomputing 361: 29-39 (2019) - [j5]Qi Li, JunQi Dong, Jiang Zhong, Qing Li, Chen Wang:
A neural model for type classification of entities for text. Knowl.-Based Syst. 176: 122-132 (2019) - [j4]Jiang Zhong, Pan Zhang, Xue Li:
Adaptive recognition of different accents conversations based on convolutional neural network. Multimedia Tools Appl. 78(21): 30749-30767 (2019) - [c25]Xiaojun Zheng, Jiang Zhong, Yanbin Sun, Yanjun Shi, Zhizheng Xu, Hao Sun:
Design of Optimization Platform for Energy Absorption Structure of High Speed Train. CSCWD 2019: 279-283 - [c24]Qi Li, Jiang Zhong, Qing Li, Zehong Cao, Chen Wang:
Enhancing Network Embedding with Implicit Clustering. DASFAA (1) 2019: 452-467 - 2018
- [c23]Jiang Zhong, Chen Wang, Qi Li, Qing Li:
A New Graph-Partitioning Algorithm for Large-Scale Knowledge Graph. ADMA 2018: 434-444 - 2017
- [c22]Qian Zhou, Jiandong Jiang, Zhangfeng Zhao, Jiang Zhong, Bosong Pan, Xiao Jin, Yuanfang Sun:
Research on the Internet of Things Platform Design for Agricultural Machinery Operation and Operation Management. CCTA (2) 2017: 400-410 - [c21]Qi Li, Jiang Zhong, Linjiang Zheng, Xue Li:
Streaming Graph Partitioning for Large Graphs with Limited Memory. ISPA/IUCC 2017: 1269-1271 - [c20]Jiang Zhong, Pan Zhang, Xue Li:
A Combined Feature Approach for Speaker Segmentation Using Convolution Neural Network. PCM (2) 2017: 550-559 - 2016
- [c19]Jiang Zhong, You Xiong, Weili Guo, Jingyi Xie:
EDAHT: An Expertise Degree Analysis Model for Mass Comments in the E-Commerce System. ADMA 2016: 472-480 - [c18]Sanad Al-Maskari, Eve Bélisle, Xue Li, Sébastien Le Digabel, Amin Nawahda, Jiang Zhong:
Classification with Quantification for Air Quality Monitoring. PAKDD (1) 2016: 578-590 - 2014
- [c17]Jingyi Xie, Jiang Zhong, Pan Deng:
A Robust Trust Management Model for E-Commerce System. ICEBE 2014: 170-176 - [c16]Sayan Unankard, Xue Li, Mohamed A. Sharaf, Jiang Zhong, Xueming Li:
Predicting Elections from Social Networks Based on Sub-event Detection and Sentiment Analysis. WISE (2) 2014: 1-16 - 2011
- [c15]Jiang Zhong, Shitao Deng, Yifeng Cheng:
Web Recommendation Based on Back Propagation Neural Networks. ISNN (3) 2011: 397-406 - 2010
- [j3]Jiang Zhong, Xue Li:
Unified collaborative filtering model based on combination of latent features. Expert Syst. Appl. 37(8): 5666-5672 (2010) - [j2]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification. Frontiers Comput. Sci. China 4(4): 560-570 (2010) - [c14]Jiang Zhong, Longhai Liu, Zhiguo Li:
A Novel Clustering Algorithm Based on Gravity and Cluster Merging. ADMA (1) 2010: 302-309 - [c13]Jiang Zhong, Xiongbing Deng, Jie Liu, Xue Li, Chuanwei Liang:
A Novel Chinese Text Feature Selection Method Based on Probability Latent Semantic Analysis. ISNN (2) 2010: 276-281 - [e2]Longbing Cao, Yong Feng, Jiang Zhong:
Advanced Data Mining and Applications - 6th International Conference, ADMA 2010, Chongqing, China, November 19-21, 2010, Proceedings, Part I. Lecture Notes in Computer Science 6440, Springer 2010, ISBN 978-3-642-17315-8 [contents] - [e1]Longbing Cao, Jiang Zhong, Yong Feng:
Advanced Data Mining and Applications - 6th International Conference, ADMA 2010, Chongqing, China, November 19-21, 2010, Proceedings, Part II. Lecture Notes in Computer Science 6441, Springer 2010, ISBN 978-3-642-17312-7 [contents]
2000 – 2009
- 2009
- [j1]Luosheng Wen, Xiaofan Yang, Jiang Zhong, Liang Han:
Canonical form of a nonlinear monetary system. Applied Mathematics and Computation 214(1): 90-94 (2009) - [c12]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Web Text Classifier. ISNN (2) 2009: 684-693 - 2008
- [c11]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Detection Classifier. ICIC (2) 2008: 526-533 - [c10]Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6. NAS 2008: 137-143 - [c9]Chunxiao Ye, Zhongfu Wu, Jiang Zhong, Yong Feng:
Revocation in an Attribute-Based Delegation Model. NAS 2008: 171-172 - [c8]Jiang Zhong, Luosheng Wen, Yong Feng, Chunxiao Ye:
Intrusion Detection Based on Density Level Sets Estimation. NAS 2008: 173-174 - 2007
- [c7]Jiang Zhong, Yong Feng, Chunxiao Ye, Ling Ou, Zhiguo Li:
Artificial Immune Networks Based Radial Basic Function Neural Networks Construction Algorithm and Application. ICNC (1) 2007: 104-107 - [c6]Yong Feng, Jiang Zhong, Zhongyang Xiong, Chunxiao Ye, Kaigui Wu:
Network Anomaly Detection Based on DSOM and ACO Clustering. ISNN (2) 2007: 947-955 - [c5]Zhiguo Li, Jiang Zhong, Yong Feng, Zhongfu Wu:
An Adaptive Classifier Based on Artificial Immune Network. LSMS (2) 2007: 422-428 - 2006
- [c4]Yong Feng, Jiang Zhong, Chunxiao Ye, Zhongfu Wu:
Clustering based on Self-Organizing Ant Colony Networks with Application to Intrusion Detection. ISDA (2) 2006: 1077-1080 - [c3]Jiang Zhong, Zhiguo Li, Yong Feng, Chunxiao Ye:
Intrusion Detection Based on Adaptive RBF Neural Network. ISDA (2) 2006: 1081-1084 - [c2]Jiang Zhong, Chunxiao Ye, Yong Feng, Ying Zhou, Zhongfu Wu:
Neuron Selection for RBF Neural Network Classifier Based on Multiple Granularities Immune Network. ISNN (1) 2006: 866-872 - 2005
- [c1]Jiang Zhong, Zhongfu Wu, Kaigui Wu, Ling Ou, Zheng-Zhou Zhu, Ying Zhou:
A Two-Phase Clustering Algorithm Based on Artificial Immune Network. ICNC (2) 2005: 814-821
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-08 21:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint