• Publications
  • Influence

Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage publications (all current information on this profile has been aggregated automatically from publisher and metadata sources).
  • Wei Chen, Xiaoshen Xie, Jianbing Peng, Jiale Wang, Zhao Duan, Haoyuan Hong
  • Geography
  • 2017 (First Published: 15 December 2017)
  • ABSTRACTThe main purpose of this paper is to explore some potential applications of sophisticated machine learning techniques such as the kernel logistic regression, Naive-Bayes tree and alternatingContinue Reading
  • Wei Chen, Aik Rui Tan, Andrew L. Ferguson
  • Chemistry, Medicine
  • The Journal of chemical physics
  • 2018 (First Published: 21 August 2018)
  • Auto-associative neural networks ("autoencoders") present a powerful nonlinear dimensionality reduction technique to mine data-driven collective variables from molecular simulation trajectories. ThisContinue Reading
  • Haoyuan Hong, Biswajeet Pradhan, Dieu Tien Bui, Chong Xu, Ahmed M. Youssef, Wei Chen
  • Geography
  • 2017 (First Published: 15 December 2017)
  • ABSTRACTSuichuan is a mountainous area at the Jiangxi province in Central China, where rainfall-induced landslides occur frequently. The purpose of this study is to assess landslide susceptibility ofContinue Reading
  • Mohsen Hosseinalizadeh, Narges Kariminejad, +4 authors John P. Tiefenbacher
  • Geology
  • 2019 (First Published: 1 March 2019)
  • Abstract Despite the importance of delineating spatial modelling of gully headcuts (GHs) in erosion-prone environments, assessments of the factors that control the occurrence of headcuts is lacking.Continue Reading
  • Weidong Fang, Wuxiong Zhang, Yang Yang, Yang Liu, Wei Chen
  • Mathematics, Computer Science
  • Science China Information Sciences
  • 2016 (First Published: 1 April 2017)
  • Compared with the encryption and the authentication which can prevent the external attacks, the trust management schemes are the better approaches for defending against the internal attacks inContinue Reading