متابعة
Xiaotie Deng
Xiaotie Deng
Chair Professor of Computer Science, Peking University, Beijing, China
بريد إلكتروني تم التحقق منه على pku.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Settling the Complexity of Two-Player Nash Equilibrium.
X Chen, X Deng
FOCS 6, 261-272, 2006
896*2006
On the complexity of cooperative solution concepts
X Deng, CH Papadimitriou
Mathematics of operations research 19 (2), 257-266, 1994
8261994
Settling the complexity of computing two-player Nash equilibria
X Chen, X Deng, SH Teng
Journal of the ACM (JACM) 56 (3), 1-57, 2009
7462009
News impact on stock price return via sentiment analysis
X Li, H Xie, L Chen, J Wang, X Deng
Knowledge-Based Systems 69, 14-23, 2014
6332014
Efficient phrase-based document similarity for clustering
H Chim, X Deng
IEEE Transactions on knowledge and data engineering 20 (9), 1217-1229, 2008
545*2008
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
AY Fu, L Wenyin, X Deng
IEEE transactions on dependable and secure computing 3 (4), 301-311, 2006
4382006
Exploring an unknown graph
X Deng, CH Papadimitriou
Journal of Graph Theory 32 (3), 265-297, 1999
3851999
Exploiting topic based twitter sentiment for stock prediction
J Si, A Mukherjee, B Liu, Q Li, H Li, X Deng
Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013
3722013
How to learn an unknown environment. i: the rectilinear case
X Deng, T Kameda, C Papadimitriou
Journal of the ACM (JACM) 45 (2), 215-245, 1998
363*1998
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian conference on information security and privacy, 235-246, 2006
2762006
Linear-time representation algorithms for proper circular-arc graphs and proper interval graphs
X Deng, P Hell, J Huang
SIAM Journal on Computing 25 (2), 390-403, 1996
2591996
An antiphishing strategy based on visual similarity assessment
W Liu, X Deng, G Huang, AY Fu
IEEE Internet Computing 10 (2), 58-65, 2006
2572006
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2502008
Detection of phishing webpages based on visual similarity
L Wenyin, G Huang, L Xiaoyue, Z Min, X Deng
Special interest tracks and posters of the 14th international conference on …, 2005
2482005
Algorithmic aspects of the core of combinatorial optimization games
X Deng, T Ibaraki, H Nagamochi
Mathematics of Operations Research 24 (3), 751-766, 1999
2341999
On the complexity of equilibria
X Deng, C Papadimitriou, S Safra
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
230*2002
Computing Nash equilibria: Approximation and smoothed complexity
X Chen, X Deng, SH Teng
2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06 …, 2006
2202006
Empirical analysis: stock market prediction via extreme learning machine
X Li, H Xie, R Wang, Y Cai, J Cao, F Wang, H Min, X Deng
Neural Computing and Applications 27, 67-78, 2016
1862016
Accessor variety criteria for Chinese word extraction
H Feng, K Chen, X Deng, W Zheng
Computational linguistics 30 (1), 75-93, 2004
1842004
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1752010
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20