计算机基础教学的核心任务是计算思维能力的培养——《 九校联盟 (C9) 计算机基础教学发展战略联合声明》 解读 何钦铭, 陆汉权, 冯博琴 | 327 | 2010 |
Smart contract vulnerability detection using graph neural networks Y Zhuang, Z Liu, P Qian, Q Liu, X Wang, Q He Proceedings of the Twenty-Ninth International Conference on International …, 2021 | 236 | 2021 |
Performance measuring and comparing of virtual machine monitors J Che, Q He, Q Gao, D Huang 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 132 | 2008 |
Towards automated reentrancy detection for smart contracts based on sequential models P Qian, Z Liu, Q He, R Zimmermann, X Wang IEEE Access 8, 19685-19695, 2020 | 131 | 2020 |
虚拟化云计算平台的能耗管理 叶可江, 吴朝晖, 姜晓红, 何钦铭 计算机学报 35 (006), 1262-1285, 2012 | 128 | 2012 |
Behavior pattern clustering in blockchain networks B Huang, Z Liu, J Chen, A Liu, Q Liu, Q He Multimedia Tools and Applications 76, 20099-20110, 2017 | 102 | 2017 |
Synthesis of Wafer-Scale Monolayer WS2 Crystals toward the Application in Integrated Electronic Devices J Chen, K Shao, W Yang, W Tang, J Zhou, Q He, Y Wu, C Zhang, X Li, ... ACS applied materials & interfaces 11 (21), 19381-19387, 2019 | 82 | 2019 |
Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion Z Liu, P Qian, X Wang, L Zhu, Q He, S Ji arXiv preprint arXiv:2106.09282, 2021 | 73 | 2021 |
基于超文本结构的智能计算机辅助教学系统 陈颖, 何钦铭, 王申康 计算机研究与发展 35 (5), 442-446, 1998 | 61 | 1998 |
Defiranger: Detecting price manipulation attacks on defi applications S Wu, D Wang, J He, Y Zhou, L Wu, X Yuan, Q He, K Ren arXiv preprint arXiv:2104.15068, 2021 | 60 | 2021 |
Mining regional co-location patterns with kNNG F Qian, K Chiew, Q He, H Huang Journal of Intelligent Information Systems 42, 485-505, 2014 | 60 | 2014 |
基于计算思维的 “大学计算机基础” 课程教学内容设计 陆汉权, 何钦铭, 徐镜春 中国大学教学 9, 55-58, 2012 | 52 | 2012 |
人工智能基础 高济, 自动化, 朱淼良, 何钦铭 高等教育出版社, 2002 | 51 | 2002 |
Online e-commerce fraud: a large-scale detection and analysis H Weng, Z Li, S Ji, C Chu, H Lu, T Du, Q He 2018 IEEE 34th International Conference on Data Engineering (ICDE), 1435-1440, 2018 | 50 | 2018 |
Virt-LM: a benchmark for live migration of virtual machine D Huang, D Ye, Q He, J Chen, K Ye Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011 | 49 | 2011 |
大学计算机基础教改新尝试 陆汉权, 何钦铭, 周群 计算机教育, 62-63, 2004 | 48 | 2004 |
Smart contract vulnerability detection technique: A survey P Qian, Z Liu, Q He, B Huang, D Tian, X Wang arXiv preprint arXiv:2209.05872, 2022 | 46 | 2022 |
“程序设计基础” 课程教学实施方案 何钦铭, 颜晖, 苏小红, 叶乃文 中国大学教学, 62-65, 2010 | 46 | 2010 |
GMAC: a seed-insensitive approach to local community detection L Ma, H Huang, Q He, K Chiew, J Wu, Y Che Data Warehousing and Knowledge Discovery: 15th International Conference …, 2013 | 38 | 2013 |
Fedrecattack: Model poisoning attack to federated recommendation D Rong, S Ye, R Zhao, HN Yuen, J Chen, Q He 2022 IEEE 38th International Conference on Data Engineering (ICDE), 2643-2655, 2022 | 37 | 2022 |