default search action
Jinsheng Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Weicheng Sun, Jinsheng Xu, Weihan Zhang, Xuelian Li, Yongbin Zeng, Ping Zhang:
Funnel graph neural networks with multi-granularity cascaded fusing for protein-protein interaction prediction. Expert Syst. Appl. 257: 125030 (2024) - [j14]Jinsheng Xu, Weicheng Sun, Kai Li, Wenxue Zhang, Weihan Zhang, Yongbin Zeng, Leon Wong, Ping Zhang:
MNESEDA: A prior-guided subgraph representation learning framework for predicting disease-related enhancers. Knowl. Based Syst. 294: 111734 (2024) - 2023
- [j13]Zhipeng Liu, Junyi Hu, Yang Liu, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network. IEEE Access 11: 91116-91132 (2023) - [j12]Guodong Li, Weicheng Sun, Jinsheng Xu, Lun Hu, Weihan Zhang, Ping Zhang:
GA-ENs: A novel drug-target interactions prediction method by incorporating prior Knowledge Graph into dual Wasserstein Generative Adversarial Network with gradient penalty. Appl. Soft Comput. 139: 110151 (2023) - [j11]Kai Li, Ping Zhang, Zilin Wang, Wei Shen, Weicheng Sun, Jinsheng Xu, Zi Wen, Li Li:
iEnhance: a multi-scale spatial projection encoding network for enhancing chromatin interaction data resolution. Briefings Bioinform. 24(4) (2023) - [j10]Ping Zhang, Weicheng Sun, Dengguo Wei, Guodong Li, Jinsheng Xu, Zhuhong You, Bowei Zhao, Li Li:
PDA-PRGCN: identification of Piwi-interacting RNA-disease associations through subgraph projection and residual scaling-based feature augmentation. BMC Bioinform. 24(1): 18 (2023) - 2022
- [c42]Jinsheng Xu, Xiaohong Yuan, Swathi Nallela, Kevin Hillard, Jinghua Zhang:
Learn ARP Spoofing Attack in a Game. FIE 2022: 1-5 - [c41]Alex Sumner, Jinsheng Xu, Xiaohong Yuan:
Determining Phishing Emails using URL Domain Features. ICAIC 2022: 1-5 - 2021
- [c40]Patrickson Weanquoi, Jinghua Zhang, Xiaohong Yuan, Jinsheng Xu, Elva J. Jones:
Learn Access Control Concepts in a Game. FIE 2021: 1-6 - 2020
- [j9]Jian Zhao, Huan Zhang, Zhiqun Yang, Jinsheng Xu, Tianhua Xu, Chao Wang:
Few-Mode Fibers With Uniform Differential Mode Group Delay for Microwave Photonic Signal Processing. IEEE Access 8: 135176-135183 (2020) - [c39]Qinrui Yu, Jinsheng Xu, Huiming Yu, Xiaohong Yuan:
The Design and Implementation of Secure Program Design Education Tool. CSEDU (1) 2020: 319-324 - [c38]Jinghua Zhang, Xiaohong Yuan, Jaris Johnson, Jinsheng Xu, Mounika Vanamala:
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts. FIE 2020: 1-7 - [c37]Hanan Alshaher, Jinsheng Xu:
A New Term Weight Scheme and Ensemble Technique for Authorship Identification. ICCDA 2020: 123-130 - [c36]Patrickson Boan Weanquoi, Jinghua Zhang, Jinsheng Xu, Xiaohong Yuan, Elva J. Jones:
Developing and Assessing an Educational Game for Teaching Access Control. ICER 2020: 312
2010 – 2019
- 2019
- [c35]Jinghua Zhang, Xiaohong Yuan, Jinsheng Xu, Elva J. Jones:
Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science. CompEd 2019: 241 - [c34]Xiaohong Yuan, Tian Zhang, Ali Albu Shama, Jinsheng Xu, Li Yang, Jennifer T. Ellis, Wu He, Cynthia Waters:
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning. FIE 2019: 1-6 - 2018
- [c33]Anthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. ITNAC 2018: 1-6 - [c32]Joshua Gaston, Mina Narayanan, Gerry V. Dozier, D. Lisa Cothran, Clarissa Arms-Chavez, Marcia Rossi, Michael C. King, Jinsheng Xu:
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective. SSCI 2018: 920-927 - [c31]Joshua Gaston, Mina Narayanan, Gerry V. Dozier, D. Lisa Cothran, Clarissa Arms-Chavez, Marcia Rossi, Michael C. King, Jinsheng Xu:
Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features. SSCI 2018: 933-940 - 2017
- [c30]Brandon Scott, Jinsheng Xu, Jinghua Zhang, Ariana Brown, Erica Clark, Xiaohong Yuan, Anna Yu, Kenneth Williams:
An interactive visualization tool for teaching ARP spoofing attack. FIE 2017: 1-5 - [c29]Xiaohong Yuan, Li Yang, Wu He, Jennifer T. Ellis, Jinsheng Xu, Cynthia K. Waters:
Enhancing Cybersecurity Education Using POGIL (Abstract Only). SIGCSE 2017: 719 - [c28]Christina Faust, Gerry V. Dozier, Jinsheng Xu, Michael C. King:
Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III. SSCI 2017: 1-8 - 2016
- [c27]Khaled F. Alotaibi, Jinsheng Xu, Abdollah Homaifar:
Detection of cyber attacks with access to partial data in power system using spy nodes. EIT 2016: 527-534 - [c26]Jinsheng Xu, Xiaohong Yuan, Anna Yu, Jung Hee Kim, Taehee Kim, Jinghua Zhang:
Developing and evaluating a hands-on lab for teaching local area network vulnerabilities. FIE 2016: 1-4 - [c25]Xiaohong Yuan, Kenneth Williams, D. Scott McCrickard, Charles Hardnett, Litany H. Lineberry, Kelvin S. Bryant, Jinsheng Xu, Albert C. Esterline, Anyi Liu, Selvarajah Mohanarajah, Rachel Rutledge:
Teaching mobile computing and mobile security. FIE 2016: 1-6 - [c24]Jinsheng Xu, Xiaohong Yuan, Ashrith Velma:
Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only). SIGCSE 2016: 689-690 - [c23]Xiaohong Yuan, Jinsheng Xu, Huiming Yu, Junghee Kim, Taehee Kim:
Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only). SIGCSE 2016: 693 - 2015
- [c22]Khaled F. Alotaibi, Milad Moghassem Hamidi, Morteza Talebi, Jinsheng Xu, Abdollah Homaifar:
Using spy node to identify cyber-attack in power systems as a novel approach. EIT 2015: 581-586 - [c21]Jinsheng Xu, Xiaohong Yuan:
Developing a course module for teaching cryptography programming on Android. FIE 2015: 1-4 - [c20]Xiaohong Yuan, Kelvin S. Bryant, Kenneth Williams, Jinsheng Xu:
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only). SIGCSE 2015: 686 - 2014
- [j8]Roy M. Pemberton, Timothy Cox, Rachel Tuffin, Guido A. Drago, John Griffiths, Robin Pittson, Graham Johnson, Jinsheng Xu, Ian C. Sage, Rhodri Davies, Simon K. Jackson, Gerry Kenna, Richard Luxton, John P. Hart:
Fabrication and Evaluation of a Micro(Bio)Sensor Array Chip for Multiple Parallel Measurements of Important Cell Biomarkers. Sensors 14(11): 20519-20532 (2014) - 2013
- [j7]Qiyao Yu, Yaling Bai, Junxia Zhang, Liwen Cui, Huiran Zhang, Jinsheng Xu, Chao Gao:
Analysis of a Single Hemodialysis on Phosphate Removal of the Internal Fistula Patients by Mathematical and Statistical Methods. Comput. Math. Methods Medicine 2013: 856897:1-856897:6 (2013) - [j6]Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of Security Standards Applicable to Health Information Systems. Int. J. Inf. Secur. Priv. 7(4): 22-36 (2013) - [c19]Xiaohong Yuan, Jinsheng Xu, Hong Wang, Kossi D. Edoh:
Developing an interdisciplinary Health Informatics Security and privacy program. FIE 2013: 1618-1622 - 2012
- [j5]Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of U.S. Laws for Health Information Security & Privacy. Int. J. Inf. Secur. Priv. 6(4): 40-54 (2012) - [c18]Xiaohong Yuan, Jinsheng Xu, Kossi D. Edoh, Hong Wang:
Developing an interdisciplinary health informatics security and privacy program (abstract only). SIGCSE 2012: 666 - 2010
- [j4]Xiaohong Yuan, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, Jinsheng Xu:
Visualization Tools for Teaching Computer Security. ACM Trans. Comput. Educ. 9(4): 20:1-20:28 (2010) - [c17]Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu:
Case studies for teaching physical security and security policy. InfoSecCD 2010: 21-26
2000 – 2009
- 2009
- [j3]Christo Dichev, Jinsheng Xu, Darina Dicheva, Jinghua Zhang:
Measuring Similarity of Interests for Clustering Taggers and Resources. Int. J. Virtual Communities Soc. Netw. 1(3): 1-20 (2009) - [c16]Jinsheng Xu, Christo Dichev, Albert C. Esterline, Darina Dicheva, Jinghua Zhang:
On the Effectiveness of Collaborative Tagging Systems for Describing Resources. CSIE (4) 2009: 467-471 - 2008
- [c15]Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu:
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. ACIS-ICIS 2008: 55-60 - [c14]Jinsheng Xu, Jinghua Zhang, Toyan Harvey, Javier Young:
A Survey of Asynchronous Collaboration Tools. Enterprise Information Systems and Web Technologies 2008: 167-171 - [c13]Christo Dichev, Jinsheng Xu, Darina Dicheva, Jinghua Zhang:
A Study on Community Formation in Collaborative Tagging Systems. Web Intelligence/IAT Workshops 2008: 13-16 - [c12]Jinsheng Xu, Levent Yilmaz, Jinghua Zhang:
Agent simulation of collaborative knowledge processing in Wikipedia. SpringSim 2008: 19-25 - 2007
- [c11]Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence, Bill Chu, Dechang Gu:
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. ACIS-ICIS 2007: 1030-1035 - [c10]Xiaohong Yuan, Percy Vega, Jinsheng Xu, Huiming Yu, Yaohang Li:
Using packet sniffer simulator in the class: experience and evaluation. ACM Southeast Regional Conference 2007: 116-121 - [c9]Jinghua Zhang, Jinsheng Xu, Huiming Yu:
Octree-Based 3D Animation Compression with Motion Vector Sharing. ITNG 2007: 202-207 - 2006
- [c8]Huiming Yu, Jin Zhang, Jinsheng Xu:
Multi-Agent Testing Architecture for Monitoring and Analyzing the Performance of Web Applications. ACIS-ICIS 2006: 115-120 - [c7]Jinghua Zhang, Jinsheng Xu:
Optimizing octree motion representation for 3D animation. ACM Southeast Regional Conference 2006: 50-55 - [c6]Jinsheng Xu, Jinghua Zhang:
Efficiently unifying parallel simulation techniques. ACM Southeast Regional Conference 2006: 228-232 - [c5]Huiming Yu, L. Wang, Jinsheng Xu:
A Hybrid Computer Supported Collaboration and Visualization System. CSCWD 2006: 177-181 - [c4]Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse:
LAN attacker: a visual education tool. InfoSecCD 2006: 118-123 - [c3]Huiming Yu, W. Liao, Xiaohong Yuan, Jinsheng Xu:
Teaching a web security course to practice information assurance. SIGCSE 2006: 12-16 - 2005
- [j2]Moon-Jung Chung, Jinsheng Xu:
An overhead reducing technique for Time Warp. J. Parallel Distributed Comput. 65(1): 65-73 (2005) - 2004
- [j1]Jinsheng Xu, Moon-Jung Chung:
Predicting the Performance of Synchronous Discrete Event Simulation. IEEE Trans. Parallel Distributed Syst. 15(12): 1130-1137 (2004) - 2002
- [c2]Moon-Jung Chung, Jinsheng Xu:
An Overhead Reducing Technique for Time Warp. DS-RT 2002: 95-102 - 2001
- [c1]Jinsheng Xu, Moon-Jung Chung:
Predicting the Performance of Synchronous Discrete Event Simulation Systems. ICCAD 2001: 18-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint