• Publications
  • Influence
ARPACK users' guide - solution of large-scale eigenvalue problems with implicitly restarted Arnoldi methods
List of figures List of tables Preface 1. Introduction to ARPACK. Important features Getting started Reverse communication interface Availability Installation Documentation Dependence on LAPACK andExpand
  • 2,467
  • 156
  • Open Access
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
To date, as one of the most popular online social networks (OSNs), Twitter is paying its dues as more and more spammers set their sights on this microblogging site. Twitter spammers can achieve theirExpand
  • 335
  • 36
  • Open Access
Nervous system involvement after infection with COVID-19 and other coronaviruses
Abstract Viral infections have detrimental impacts on neurological functions, and even to cause severe neurological damage. Very recently, coronaviruses (CoV), especially severe acuteExpand
  • 334
  • 31
A vector space model for information retrieval
  • 343
  • 26
Comparison of public peak detection algorithms for MALDI mass spectrometry data analysis
BackgroundIn mass spectrometry (MS) based proteomic data analysis, peak detection is an essential step for subsequent analysis. Recently, there has been significant progress in the development ofExpand
  • 217
  • 23
The Sunway TaihuLight supercomputer: system and applications
The Sunway TaihuLight supercomputer is the world’s first system with a peak performance greater than 100 PFlops. In this paper, we provide a detailed introduction to the TaihuLight system. InExpand
  • 219
  • 20
  • Open Access
A Benchmark Study on the Thermal Conductivity of Nanofluids
This article reports on the International Nanofluid Property Benchmark Exercise, or INPBE, in which the thermal conductivity of identical samples of colloidally stable dispersions of nanoparticles orExpand
  • 835
  • 18
  • Open Access
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
Most existing malicious Android app detection approaches rely on manually selected detection heuristics, features, and models. In this paper, we describe a new, complementary system, calledExpand
  • 183
  • 16
  • Open Access
PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices
  • X. Wang, C. Yang, S. Mao
  • Computer Science
  • IEEE 37th International Conference on Distributed…
  • 5 June 2017
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such signals provide important clues of medical conditions. Effective solutions are needed to provideExpand
  • 91
  • 16
A Survey on Deep Transfer Learning
As a new classification platform, deep learning has recently received increasing attention from researchers and has been successfully applied to many domains. In some domains, like bioinformatics andExpand
  • 282
  • 15
  • Open Access