Yan Jia
Yan Jia
National University of Defence Technology
Verified email at vip.sina.com
Title
Cited by
Cited by
Year
A recommendation-based peer-to-peer trust model
W Dou, HM Wang, Y Jia, P Zou
Journal of software 15 (4), 571-583, 2004
379*2004
构造基于推荐的 Peer-to-Peer 环境下的 Trust 模型
窦文, 王怀民, 贾焰, 邹鹏
软件学报 15 (4), 2004
3292004
构造基于推荐的 Peer-to-Peer 环境下的 Trust 模型
窦文, 王怀民, 贾焰, 邹鹏
329*
分布式数据库技术
贾焰, 王志英, 韩伟红, 李霖
第一版. 国防工业出版社, 2000
1182000
Community detection in incomplete information networks
W Lin, X Kong, PS Yu, Q Wu, Y Jia, C Li
Proceedings of the 21st international conference on World Wide Web, 341-350, 2012
1072012
Continuous privacy preserving publishing of data streams
B Zhou, Y Han, J Pei, B Jiang, Y Tao, Y Jia
Proceedings of the 12th International Conference on Extending Database …, 2009
1012009
Identifying users across social networks based on dynamic core interests
Y Nie, Y Jia, S Li, X Zhu, A Li, B Zhou
Neurocomputing 210, 107-115, 2016
662016
Understanding importance of collaborations in co-authorship networks: A supportiveness analysis approach
Y Han, B Zhou, J Pei, Y Jia
Proceedings of the 2009 SIAM International Conference on Data Mining, 1112-1123, 2009
542009
微博数据挖掘研究综述
丁兆云, 贾 焰, 周 斌
计算机研究与发展 51 (4), 691-706, 2014
532014
Mining topical influencers based on the multi-relational network in micro-blogging sites
D Zhaoyun, J Yan, Z Bin, H Yi
China Communications 10 (1), 93-104, 2013
522013
基于非合作动态博弈的网络安全主动防御技术研究
林旺群, 王慧, 刘家红, 邓镭, 李爱平, 吴泉源, 贾焰
计算机研究与发展 48 (2), 306-316, 2011
512011
Instant message clustering based on extended vector space model
L Wang, Y Jia, W Han
International Symposium on Intelligence Computation and Applications, 435-443, 2007
452007
Research and development of provable data integrity in cloud storage
S Tan, Y Jia, WH Han
Chinese Journal of Computers 38 (1), 164-177, 2015
442015
Mining user interest in microblogs with a user-topic model
D Li, H., Yan, J., Weihong, H., Zhaoyun
China Communications 11 (8), 131-144, 2014
412014
大规模网络安全态势分析与预测系统 YHSAS
韩伟红, 隋品波, 贾焰
信息网络安全, 0-0, 2012
402012
云存储中的数据完整性证明研究及进展
谭霜, 贾焰, 韩伟红
计算机学报 38 (1), 164-177, 2015
372015
A P2P approach for global computing
W Dou, Y Jia, HM Wang, WQ Song, P Zou
Parallel and Distributed Processing Symposium, 2003. Proceedings …, 2003
332003
Continuous monitoring of skyline query over highly dynamic moving objects
L Tian, L Wang, P Zou, Y Jia, A Li
Proceedings of the 6th ACM international workshop on Data engineering for …, 2007
322007
基于攻击图的网络安全概率计算方法
叶云, 徐锡山, 贾焰, 齐治昌
计算机学报, 1987-1996, 2010
312010
An attack graph-based probabilistic computing approach of network security
Y Ye, XS Xu, Y Jia, ZC Qi
Jisuanji Xuebao(Chinese Journal of Computers) 33 (10), 1987-1996, 2010
302010
The system can't perform the operation now. Try again later.
Articles 1–20