Seguir
Xiaotie Deng
Xiaotie Deng
Chair Professor of Computer Science, Peking University, Beijing, China
Dirección de correo verificada de pku.edu.cn
Título
Citado por
Citado por
Año
Settling the Complexity of Two-Player Nash Equilibrium.
X Chen, X Deng
FOCS 6, 261-272, 2006
895*2006
On the complexity of cooperative solution concepts
X Deng, CH Papadimitriou
Mathematics of operations research 19 (2), 257-266, 1994
8301994
Settling the complexity of computing two-player Nash equilibria
X Chen, X Deng, SH Teng
Journal of the ACM (JACM) 56 (3), 1-57, 2009
7242009
News impact on stock price return via sentiment analysis
X Li, H Xie, L Chen, J Wang, X Deng
Knowledge-Based Systems 69, 14-23, 2014
6352014
Efficient phrase-based document similarity for clustering
H Chim, X Deng
IEEE Transactions on knowledge and data engineering 20 (9), 1217-1229, 2008
545*2008
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
AY Fu, L Wenyin, X Deng
IEEE transactions on dependable and secure computing 3 (4), 301-311, 2006
4372006
Exploring an unknown graph
X Deng, CH Papadimitriou
Journal of Graph Theory 32 (3), 265-297, 1999
3861999
Exploiting topic based twitter sentiment for stock prediction
J Si, A Mukherjee, B Liu, Q Li, H Li, X Deng
Proceedings of the 51st Annual Meeting of the Association for Computational …, 2013
3782013
How to learn an unknown environment. i: the rectilinear case
X Deng, T Kameda, C Papadimitriou
Journal of the ACM (JACM) 45 (2), 215-245, 1998
360*1998
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian Conference on Information Security and Privacy, 235-246, 2006
2772006
Linear-time representation algorithms for proper circular-arc graphs and proper interval graphs
X Deng, P Hell, J Huang
SIAM Journal on Computing 25 (2), 390-403, 1996
2581996
An antiphishing strategy based on visual similarity assessment
W Liu, X Deng, G Huang, AY Fu
IEEE Internet Computing 10 (2), 58-65, 2006
2562006
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2522008
Detection of phishing webpages based on visual similarity
L Wenyin, G Huang, L Xiaoyue, Z Min, X Deng
Special interest tracks and posters of the 14th international conference on …, 2005
2452005
Algorithmic aspects of the core of combinatorial optimization games
X Deng, T Ibaraki, H Nagamochi
Mathematics of Operations Research 24 (3), 751-766, 1999
2371999
On the complexity of equilibria
X Deng, C Papadimitriou, S Safra
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
225*2002
Computing Nash equilibria: Approximation and smoothed complexity
X Chen, X Deng, SH Teng
2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06 …, 2006
2152006
Empirical analysis: stock market prediction via extreme learning machine
X Li, H Xie, R Wang, Y Cai, J Cao, F Wang, H Min, X Deng
Neural Computing and Applications 27, 67-78, 2016
1912016
Accessor variety criteria for Chinese word extraction
H Feng, K Chen, X Deng, W Zheng
Computational linguistics 30 (1), 75-93, 2004
1832004
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1772010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20