default search action
Xianwen Fang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Xianwen Fang, Mengyao Li:
Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach. Appl. Artif. Intell. 38(1) (2024) - [j52]Ping Wu, Xianwen Fang, Huan Fang, Ziyou Gong, Daoyu Kan:
An Event Log Repair Method Based on Masked Transformer Model. Appl. Artif. Intell. 38(1) (2024) - [j51]Fadilul-lah Yassaanah Issahaku, Xiangwei Liu, Ke Lu, Xianwen Fang, Sumaiya Bashiru Danwana, Ernest Asimeng:
Multimodal deep learning model for Covid-19 detection. Biomed. Signal Process. Control. 91: 105906 (2024) - [j50]Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang:
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. Cybersecur. 7(1): 37 (2024) - [j49]Fadilul-lah Yassaanah Issahaku, Ke Lu, Xianwen Fang, Sumaiya Bashiru Danwana, Husein Mohammed Bandago:
An overview of semantic-based process mining techniques: trends and future directions. Knowl. Inf. Syst. 66(10): 5783-5827 (2024) - [j48]Daoyu Kan, Xianwen Fang:
Event log anomaly detection method based on auto-encoder and control flow. Multim. Syst. 30(1): 29 (2024) - [i1]Ziyou Gong, Xianwen Fang, Ping Wu:
Anomaly Correction of Business Processes Using Transformer Autoencoder. CoRR abs/2404.10211 (2024) - 2023
- [j47]Daoyu Kan, Xianwen Fang, Ziyou Gong:
Event Log Privacy Based on Differential Petri Nets. Appl. Artif. Intell. 37(1) (2023) - [j46]Sohaib A. Latif, Xianwen Fang, Kaleem Arshid, Abdullah Almuhaimeed, Azhar Imran, Mansoor Alghamdi:
Analysis of Birth Data using Ensemble Modeling Techniques. Appl. Artif. Intell. 37(1) (2023) - [j45]Wangyang Yu, Xuyue Wang, Xianwen Fang, Xiaojun Zhai:
Modeling and analytics of multi-factor disease evolutionary process by fusing petri nets and machine learning methods. Appl. Soft Comput. 142: 110325 (2023) - [j44]Sohaib A. Latif, Xianwen Fang, Syed Muhammad Mohsin, Syed Muhammad Abrar Akber, Sheraz Aslam, Hana Mujlid, Kaleem Ullah:
An Enhanced Virtual Cord Protocol Based Multi-Casting Strategy for the Effective and Efficient Management of Mobile Ad Hoc Networks. Comput. 12(1): 21 (2023) - [j43]George Kofi Agordzo, Xianwen Fang, Juan Li:
Privacy in process mining: Logs conversion to images using machine learning algorithm. J. Intell. Fuzzy Syst. 45(1): 1-12 (2023) - 2022
- [j42]Juan Li, Xianwen Fang, Xin Guo, Yuzhou Liu, George Kofi Agordzo:
Data attribute oriented business process effective infrequency behavior mining method. Concurr. Comput. Pract. Exp. 34(25) (2022) - [j41]Ke Lu, Xianwen Fang, Na Fang, Esther Asare:
Discovery of effective infrequent sequences based on maximum probability path. Connect. Sci. 34(1): 63-82 (2022) - [j40]Na Fang, Xianwen Fang, Ke Lu:
Online incremental updating for model enhancement based on multi-perspective trusted intervals. Connect. Sci. 34(1): 1956-1980 (2022) - [j39]Qianqian Wang, Chifeng Shao, Xianwen Fang, Huamin Zhang:
Business process recommendation method based on cost constraints. Connect. Sci. 34(1): 2520-2537 (2022) - [j38]Long Wang, Xianwen Fang, Xianya Geng:
Graphs with nullity 2c(G)+p(G)-1. Discret. Math. 345(5): 112786 (2022) - [j37]Hang Chen, Xianwen Fang, Huan Fang:
Multi-task prediction method of business process based on BERT and Transfer Learning. Knowl. Based Syst. 254: 109603 (2022) - 2021
- [j36]Liwen Zhang, Xianwen Fang, Chifeng Shao, Lili Wang:
Real-Time Repair of Business Processes Based on Alternative Operations in Case of Uncertainty. IEEE Access 9: 23672-23690 (2021) - [j35]Xiaoyan Tao, Xianwen Fang:
Detecting Data Inconsistency Based on Workflow Nets With Tables. IEEE Access 9: 81740-81749 (2021) - [j34]Na Fang, Xianwen Fang, Ke Lu, Esther Asare:
Online Incremental Mining Based on Trusted Behavior Interval. IEEE Access 9: 158562-158573 (2021) - [j33]Li-Li Wang, Xianwen Fang, Chifeng Shao, Esther Asare:
An Approach for Mining Multiple Types of Silent Transitions in Business Process. IEEE Access 9: 160317-160331 (2021) - [j32]Sohaib A. Latif, Xianwen Fang, Li-li Wang:
Intelligent decision support system approach for predicting the performance of students based on three-level machine learning technique. J. Intell. Syst. 30(1): 739-749 (2021) - [j31]Lili Wang, Xianwen Fang, Esther Asare, Huan Fang:
An Optimization Approach for Mining of Process Models with Infrequent Behaviors Integrating Data Flow and Control Flow. Sci. Program. 2021: 8874316:1-8874316:17 (2021) - [j30]Shixi Liu, Xiaojing Hu, Shui-Hua Wang, Yudong Zhang, Xianwen Fang, Cuiqing Jiang:
Mixing Patterns in Social Trust Networks: A Social Identity Theory Perspective. IEEE Trans. Comput. Soc. Syst. 8(5): 1249-1261 (2021) - 2020
- [j29]Esther Asare, Lili Wang, Xianwen Fang:
Conformance Checking: Workflow of Hospitals and Workflow of Open-Source EMRs. IEEE Access 8: 139546-139566 (2020) - [j28]Wangyang Yu, Menghan Jia, Xianwen Fang, Yao Lu, Jianchun Xu:
Modeling and analysis of medical resource allocation based on Timed Colored Petri net. Future Gener. Comput. Syst. 111: 368-374 (2020) - [j27]Xianwen Fang, Juan Li, Lili Wang, Huan Fang:
Log automaton under conditions of infrequent behaviour mining. Int. J. Inf. Technol. Manag. 19(4): 292-304 (2020) - [j26]Huan Fang, Shuya Sun, Juan Guo, Xianwen Fang:
An approach for identifying the abstraction scopes of business process Petri nets system using binary search tree. Int. J. Serv. Technol. Manag. 26(2/3): 149-166 (2020) - [j25]Juan Li, Xianwen Fang, Lili Wang, Xiangwei Liu:
基于日志自动机的业务流程混沌活动过滤方法 (Chaotic Activity Filter Method for Business Process Based on Log Automaton). 计算机科学 47(1): 66-71 (2020)
2010 – 2019
- 2019
- [j24]Huijing Hao, Xianwen Fang, Lili Wang, Xiangwei Liu:
基于Petri网行为紧密度的有效低频行为模式分析 (Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness). 计算机科学 46(2): 321-326 (2019) - [j23]Jian Song, Xianwen Fang, Lili Wang:
基于流程切的过程模型挖掘方法 (Process Model Mining Method Based on Process Cut). 计算机科学 46(7): 315-321 (2019) - [j22]Shuya Sun, Huan Fang, Xianwen Fang:
日志诱导下的形态学片段流程聚类方法 (Log-induced Morphological Fragments Process Clustering Method). 计算机科学 46(8): 71-77 (2019) - [j21]Yue Zhan, Xianwen Fang, Lili Wang:
基于配置的交互流程变化传播分析 (Analysis of Interactive Process Change Propagation Based on Configuration). 计算机科学 46(9): 303-309 (2019) - [j20]Li Ying, Xianwen Fang, Lili Wang, Xiangwei Liu:
基于业务能力的可配置业务流程模型变化域分析 (Change Region Analysis of Configurable Business Process Model Based on Business Capability). 计算机科学 46(10): 322-328 (2019) - [j19]Jian Song, Xianwen Fang, Lili Wang, Xiangwei Liu:
基于行为轮廓的业务流程隐变迁挖掘方法 (Method of Mining Hidden Transition of Business Process Based on Behavior Profiles). 计算机科学 46(12): 334-340 (2019) - [j18]Lian Duan, Xianwen Fang, Yujie Fu:
Global exponential synchronization of delayed fuzzy cellular neural networks with discontinuous activations. Int. J. Mach. Learn. Cybern. 10(3): 579-589 (2019) - 2018
- [j17]Xianwen Fang, Rui Cao, Xiangwei Liu, Lili Wang:
A Method of Mining Hidden Transition of Business Process Based on Region. IEEE Access 6: 25543-25550 (2018) - [j16]Fanchao Kong, Xianwen Fang:
Pseudo almost periodic solutions of discrete-time neutral-type neural networks with delays. Appl. Intell. 48(10): 3332-3345 (2018) - [j15]Fanchao Kong, Xianwen Fang, Zaitao Liang:
Dynamic behavior of a class of neutral-type neural networks with discontinuous activations and time-varying delays. Appl. Intell. 48(12): 4834-4854 (2018) - [j14]Pengjun Zhai, Xianwen Fang, Xiangwei Liu:
基于接口变迁的交互流程模型挖掘方法 (Interaction Process Model Mining Method Based on Interface Transitions). 计算机科学 45(3): 317-321 (2018) - [j13]Rui Cao, Xianwen Fang, Lili Wang:
基于通讯行为轮廓挖掘条件非频繁行为的方法 (Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile). 计算机科学 45(8): 310-314 (2018) - [j12]Lian Duan, Xianwen Fang, Xuejun Yi, Yujie Fu:
Finite-time synchronization of delayed competitive neural networks with discontinuous neuron activations. Int. J. Mach. Learn. Cybern. 9(10): 1649-1661 (2018) - [c19]Chong Gao, Bin Wang, Changjun Zhou, Qiang Zhang, Zhixiang Yin, Xianwen Fang:
Hybrid Invasive Weed Optimization and GA for Multiple Sequence Alignment. BIC-TA (2) 2018: 72-82 - [c18]Zhenghui Liu, Bin Wang, Changjun Zhou, Xiaopeng Wei, Qiang Zhang, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng:
An Improved Iterated Hybrid Search for DNA Codes Design. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 99-105 - [c17]Yanhong Liu, Hui Lv, Changjun Zhou, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng, Qiang Zhang:
Stability Analysis and Hopf Bifurcation Research for DNA Strand Displacement with Time Delay. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 228-233 - 2017
- [j11]Lian Duan, Lihong Huang, Zhenyuan Guo, Xianwen Fang:
Periodic attractor for reaction-diffusion high-order Hopfield neural networks with time-varying delays. Comput. Math. Appl. 73(2): 233-245 (2017) - [j10]Yanan Gao, Xianwen Fang, Lili Wang:
基于Petri网行为紧密度的业务流程配置优化分析 (Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness). 计算机科学 44(Z6): 539-542 (2017) - [c16]Zhaolei Diao, Hui Lv, Xianwen Fang, Zhixiang Yin, Qiang Zhang:
Precise linearization optimal control of cell three-compartment transition model. ICSAI 2017: 587-593 - [c15]Wendan Xie, Changjun Zhou, Xianwen Fang, Zhixiang Yin, Qiang Zhang:
Rock-Paper-Scissors Game Based on Two-Domain DNA Strand Displacement. ISICA (2) 2017: 331-340 - 2016
- [j9]Xianwen Fang, Fang Zhao, Xiangwei Liu, Huan Fang:
基于Petri网行为包含和行为继承的业务流程变化域传播分析 (Change Propagation Analysis in Business Process Based on Behavior Inclusion and Behavior Inheritance of Petri). 计算机科学 43(11): 36-39 (2016) - [j8]Pei Hua, Xianwen Fang, Xiangwei Liu:
基于拟间接依赖的过程模型挖掘方法 (Method of Process Models Mining Based on Quasi Indirect Dependence). 计算机科学 43(11): 94-97 (2016) - [j7]Huan Fang, Sucheng Wang, Xianwen Fang, Lili Wang:
基于Petri网的事件协调控制方法研究 (Study of Events Collaborative Control Method Based on Petri Nets). 计算机科学 43(11): 107-110 (2016) - [j6]Peihai Zhao, Mimi Wang, Xianwen Fang:
基于网进程的模型一致性分析方法 (Consistency Analysis Method of Models Based on Net Process). 计算机科学 43(11): 242-245 (2016) - [j5]Shu-Juan Ji, Haiyan Ma, Shu-lian Zhang, Ho-fung Leung, Dickson K. W. Chiu, Chun-jin Zhang, Xianwen Fang:
A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks. Knowl. Based Syst. 103: 1-18 (2016) - 2014
- [c14]Zhixiang Yin, Xia Sun, Feng Xu, Xianwen Fang, Hui Xu:
A DNA Computing Model on Triple-Stranded for Minimum Spanning Tree Problem. BIC-TA 2014: 549-551 - 2013
- [c13]Wangyang Yu, Xianwen Fang:
Analyzing Real-Time Predictability of Business Processes Based on Petri Nets. BIC-TA 2013: 207-215 - [c12]Lili Wang, Xianwen Fang, Dao-hao Liu:
Computation of Synchronic Distance in Marked S-net. BIC-TA 2013: 369-375 - [c11]Ouyang Hong, Xianwen Fang, Min Yu:
The Analysis Methods About Business Process of E-Commerce Based on the Petri Net. BIC-TA 2013: 559-565 - [c10]Lu Liu, Xianwen Fang, Xiangwei Liu, Jing Ji:
Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net. BIC-TA 2013: 579-585 - [c9]Xianwen Fang, Mimi Wang, Shenbing Wu:
A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles. BIC-TA 2013: 587-593 - [c8]Juan Guo, Xianwen Fang, Dawei Zheng, Xiuyun Zhang:
Research on Credibility of Web Service Composition Based on Stochastic Petri Net. BIC-TA 2013: 965-973 - [e1]Zhixiang Yin, Linqiang Pan, Xianwen Fang:
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2013, HuangShan, China, July 12-14, 2013. Advances in Intelligent Systems and Computing 212, Springer 2013, ISBN 978-3-642-37501-9 [contents] - 2011
- [j4]Xianwen Fang, Changjun Jiang, Zhixiang Yin, Xiaoqin Fan:
The trustworthiness analyzing of interacting business process based on the induction information. Comput. Sci. Inf. Syst. 8(3): 843-867 (2011) - [j3]Xiao-Qin Fan, Xianwen Fang, Chang-Jun Jiang:
Research on Web service selection based on cooperative evolution. Expert Syst. Appl. 38(8): 9736-9743 (2011) - [j2]Xiaoqin Fan, Xianwen Fang, Zhijun Ding:
Indeterminacy-aware service selection for reliable service composition. Frontiers Comput. Sci. China 5(1): 26-36 (2011) - 2010
- [j1]Xianwen Fang, Changjun Jiang, Xiaoqin Fan:
Behavior-aware Trustworthiness Study of Networked Software. Int. J. Comput. Intell. Syst. 3(5): 542-552 (2010)
2000 – 2009
- 2009
- [c7]Xianwen Fang, Changjun Jiang, Xiaoqin Fan:
Independent global constraints for web service composition based on GA and APN. GEC Summit 2009: 119-126 - [c6]Xiaoqin Fan, Changjun Jiang, Xianwen Fang:
An Efficient Approach to Web Service Selection. WISM 2009: 271-280 - [c5]Xianwen Fang, Xiaoqin Fan, Zhixiang Yin:
Constraint Web Service Composition Based on Discrete Particle Swarm Optimization. WISM 2009: 281-288 - 2008
- [c4]Shixi Liu, Zhicai Xu, Xianwen Fang:
Dependability Research of Cluster System Based on Stochastic Petri Net. CSSE (3) 2008: 481-485 - 2007
- [c3]Xianwen Fang, Zhicai Xu, Zhixiang Yin:
Distributed Processing Based on Timed Petri Nets. ICNC (5) 2007: 287-291 - [c2]Xianwen Fang, Zhicai Xu, Zhixiang Yin:
A Study about the Mapping of Process- Processor based on Petri Nets. SNPD (1) 2007: 622-626 - 2006
- [c1]Xianwen Fang, Yan Zhao, Zhixiang Yin:
The Study on Data Distribution Management Based on Petri Net. ICICIC (2) 2006: 75-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint