


default search action
World Wide Web: Internet and Web Information Systems, Volume 23
Volume 23, Number 1, January 2020
- Zhigang Wu, Yinan Jing

, Zhenying He, Chenghao Guo, X. Sean Wang:
POLYTOPE: a flexible sampling system for answering exploratory queries. 1-22 - Wei Li

, Shuai Ding, Hao Wang, Yi Chen, Shanlin Yang:
Heterogeneous ensemble learning with feature engineering for default prediction in peer-to-peer lending in China. 23-45 - Pingfu Chao

, Wen Hua
, Xiaofang Zhou
:
Trajectories know where map is wrong: an iterative framework for map-trajectory co-optimisation. 47-73 - Nan Zhou, Junping Du

, Xu Yao, Wanqiu Cui, Zhe Xue, MeiYu Liang:
A content search method for security topics in microblog based on deep reinforcement learning. 75-101 - Mingtao Lei, Lingyang Chu, Zhefeng Wang, Jian Pei

, Caifeng He, Xi Zhang, Binxing Fang:
Mining top-k sequential patterns in transaction database graphs. 103-130 - Wei Liu, Hanjiang Lai

, Jing Wang, Ge-Yang Ke, Weiwei Yang, Jian Yin:
Mix geographical information into local collaborative ranking for POI recommendation. 131-152 - Liang Chen, Yongjian Ye, Angyu Zheng, Fenfang Xie, Zibin Zheng

, Michael R. Lyu:
Incorporating geographical location for team formation in social coding sites. 153-174 - Ruchika Gupta

, Udai Pratap Rao:
Preserving location privacy using three layer RDV masking in geocoded published discrete point data. 175-206 - Bojie Shen

, Md. Saiful Islam
, David Taniar
, Junhu Wang:
Direction-based spatial skyline for retrieving surrounding objects. 207-239 - Ning Yang, Yuchi Ma, Li Chen, Philip S. Yu:

A meta-feature based unified framework for both cold-start and warm-start explainable recommendations. 241-265 - Chengzhe Yuan, Zhifeng Bao

, Mark Sanderson
, Yong Tang
:
Incorporating word attention with convolutional neural networks for abstractive summarization. 267-287 - Jia-Xu Liu, Ke Xu:

Budget-aware online task assignment in spatial crowdsourcing. 289-311 - Anqi Zhao, Guanfeng Liu

, Bolong Zheng, Yan Zhao, Kai Zheng:
Temporal paths discovery with multiple constraints in attributed dynamic graphs. 313-336 - Zheng Huo, Kerry Taylor, Xiuzhen Zhang, Suzhen Wang

, Chaoyi Pang:
Generating multidimensional schemata from relational aggregation queries. 337-359 - Dan He, Sibo Wang

, Boyu Ruan, Bolong Zheng, Xiaofang Zhou
:
Efficient and robust data augmentation for trajectory analytics: a similarity-based approach. 361-387 - An Liu, Guanfeng Liu

, Mehmet A. Orgun
, Qing Li:
Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing. 389-391 - Ying Ma

, Yu Sun, Yunjie Lei, Nan Qin, Junwen Lu:
A survey of blockchain technology on security, privacy, and trust in crowdsourcing services. 393-419 - Yongfeng Wang, Zheng Yan

, Wei Feng, Shushu Liu:
Privacy protection in mobile crowd sensing: a survey. 421-452 - Maolong Li, Zhixu Li

, Qiang Yang
, Zhigang Chen, Pengpeng Zhao, Lei Zhao:
A crowd-efficient learning approach for NER based on online encyclopedia. 453-470 - Guojia Wan, Bo Du, Shirui Pan

, Jia Wu:
Adaptive knowledge subgraph ensemble for robust and trustworthy knowledge graph completion. 471-490 - Ningning Cui, Xiaochun Yang, Bin Wang, Jing Geng, Jianxin Li

:
Secure range query over encrypted data in outsourced environments. 491-517 - Jinjing Huang, Wei Chen, Zhixu Li, Pengpeng Zhao, Weiqing Wang

, Hongzhi Yin
, Lei Zhao
:
SGPM: a privacy protected approach of time-constrained graph pattern matching in cloud. 519-547 - Xiaocui Li

, Yangtao Wang
, Jingkuan Song, Yu Liu
, Xinyu Zhang, Ke Zhou, Chunhua Li:
A low cost and un-cancelled laplace noise based differential privacy algorithm for spatial decompositions. 549-572 - Bo Liu

, Xiangguo Sun
, Zeyang Ni, Jiuxin Cao, Junzhou Luo, Benyuan Liu, Xinwen Fu
:
Co-Detection of crowdturfing microblogs and spammers in online social networks. 573-607 - Tianming Zhang, Yunjun Gao, Linshan Qiu, Lu Chen, Qingyuan Linghu, Shiliang Pu:

Distributed time-respecting flow graph pattern matching on temporal graphs. 609-630 - Detian Zhang, Shiting Wen

, Fei Chen, Zhixu Li, Lei Zhao:
Spatial crowdsourcing based on Web mapping services. 631-648 - Lei Li

, Fang Zhang, Zan Zhang, Peipei Li, Chenyang Bu
:
Multi-fuzzy-objective graph pattern matching in big graph environments with reliability, trust and social relationship. 649-669 - Hai Tang, Mingjun Xiao

, Guoju Gao, Hui Zhao:
Reverse-auction-based crowdsourced labeling for active learning. 671-689
Volume 23, Number 2, March 2020
- Kai Zheng, Guanfeng Liu

, Mehmet A. Orgun
, Junping Du:
Preface to the Special Issue on Graph Data Management in Online Social Networks. 691-692 - GuoHui Li, Ming Dong, Fuming Yang, Jun Zeng, Jiansen Yuan, Congyuan Jin, Nguyen Quoc Viet Hung

, Phan Thanh Cong, Bolong Zheng
:
Misinformation-oriented expert finding in social networks. 693-714 - Fanzhen Liu

, Jia Wu
, Shan Xue
, Chuan Zhou, Jian Yang
, Quanzheng Sheng
:
Detecting the evolving community structure in dynamic social networks. 715-733 - Haoze Yu, Haisheng Li

, Dianhui Mao, Qiang Cai:
A relationship extraction method for domain knowledge graph construction. 735-753 - Jinjing Huang, Wei Chen, An Liu, Weiqing Wang

, Hongzhi Yin
, Lei Zhao
:
Cluster query: a new query pattern on temporal knowledge graph. 755-779 - Xiaocui Li

, Hongzhi Yin
, Ke Zhou, Xiaofang Zhou
:
Semi-supervised clustering with deep metric learning and graph embedding. 781-798 - Yuan Li

, Guoren Wang, Yuhai Zhao, Feida Zhu
, Yubao Wu
:
Towards k-vertex connected component discovery from large networks. 799-830 - Yang Qian

, Yezheng Liu, Yuanchun Jiang
, Xiao Liu
:
Detecting topic-level influencers in large-scale scientific networks. 831-851 - Zikai Yin, Tong Xu, Hengshu Zhu

, Chen Zhu, Enhong Chen
, Hui Xiong:
Matching of social events and users: a two-way selection perspective. 853-871 - Fan Zhang

, Lei Zou, Li Zeng
, Xiangyang Gou:
Dolha - an efficient and exact data structure for streaming graphs. 873-903 - Junhua Fang, Jiafeng Ding, Pengpeng Zhao, Jiajie Xu, An Liu, Zhixu Li:

Distributed and parallel processing for real-time and dynamic spatio-temporal graph. 905-926 - Yujun Chen, Juhua Pu, Xingwu Liu, Xiangliang Zhang

:
Gaussian mixture embedding of multiple node roles in networks. 927-950 - Hua Wang

, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang:
Editorial: Special issue on security and privacy in network computing. 951-957 - Qiang Cao

, Yanping Li
, Zhenqiang Wu, Yinbin Miao, Jianqing Liu:
Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. 959-989 - Hao Zhang, Wenjun Zhang, Zhihan Lv

, Arun Kumar Sangaiah
, Tao Huang, Naveen K. Chilamkurti:
MALDC: a depth detection method for malware based on behavior chains. 991-1010 - Xiaoguang Li, Jun Liu

, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang:
A SDR-based verification platform for 802.11 PHY layer security authentication. 1011-1034 - Xuewen Dong

, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma:
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing. 1035-1055 - Zhao Huang

, Quan Wang:
A PUF-based unified identity verification framework for secure IoT hardware via device authentication. 1057-1088 - Xiaokang Zhou, Flávia Coimbra Delicato, Kevin I-Kai Wang, Runhe Huang:

Smart computing and cyber technology for cyberization. 1089-1100 - Bin Guo

, Huihui Chen, Yan Liu, Chao Chen, Qi Han, Zhiwen Yu
:
From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data. 1101-1125 - Marcelo Pitanga Alves

, Flávia Coimbra Delicato, Igor Leão dos Santos, Paulo F. Pires:
LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing. 1127-1175 - Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, Ke Yan

:
Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods. 1177-1195 - Gaby Bou Tayeh

, Abdallah Makhoul, Jacques Demerjian
, Christophe Guyeux
, Jacques M. Bahi:
Fault tolerant data transmission reduction method for wireless sensor networks. 1197-1216 - Ao Guo

, Jianhua Ma, Shunxiang Tan, Guanqun Sun:
From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts. 1217-1239 - Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri

, Amin Azmoodeh, Sajad Homayoun
, Kim-Kwang Raymond Choo
, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. 1241-1260 - Weimin Li

, Yuting Fan, Jun Mo, Wei Liu, Can Wang
, Minjun Xin, Qun Jin:
Three-hop velocity attenuation propagation model for influence maximization in social networks. 1261-1273 - Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang

, Xiaolong Xu
:
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. 1275-1297 - Sidra Aleem, Po Yang, Saleha Masood, Ping Li

, Bin Sheng
:
An accurate multi-modal biometric identification system for person identification via fusion of face and finger print. 1299-1317 - Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, Tao Chi:

ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites. 1319-1340 - Mabrook Al-Rakhami

, Abdu Gumaei, Mohammed Abdullah Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri
, Giancarlo Fortino:
A lightweight and cost effective edge intelligence architecture based on containerization technology. 1341-1360 - Xianghua Xu

, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, Jinjun Chen:
Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks. 1361-1380 - Xiangjie Kong

, Feng Xia
, Zhenhuan Fu, Xiaoran Yan
, Amr Tolba
, Zafer Al-Makhadmeh
:
TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction. 1381-1405 - Chun Zhao, Lei Ren, Ziqiao Zhang, Zihao Meng:

Master data management for manufacturing big data: a method of evaluation for data network. 1407-1421 - Youliang Tian

, Qiuxian Li, Jia Hu, Hui Lin:
Secure limitation analysis of public-key cryptography for smart card settings. 1423-1440 - Rui Hu, Zheng Yan

, Wenxiu Ding
, Laurence T. Yang:
A survey on data provenance in IoT. 1441-1463
Volume 23, Number 3, May 2020
- Xin Wang, Simiao Wang, Yueqi Xin, Yajun Yang, Jianxin Li

, Xiaofei Wang
:
Distributed Pregel-based provenance-aware regular path query processing on RDF knowledge graphs. 1465-1496 - Wei Deng

, Yong Shi, Zhengxin Chen, Wikil Kwak, Huimin Tang
:
Recommender system for marketing optimization. 1497-1517 - M. Amin Rigi

, Irene Moser, M. Mehdi Farhangi, Chengfei Lui:
Finding and tracking local communities by approximating derivatives in networks. 1519-1551 - Jiachun Feng, Yanghui Rao

, Haoran Xie
, Fu Lee Wang, Qing Li
:
User group based emotion detection and topic discovery over short text. 1553-1587 - Yang Zhang

, Yiwen Wu, Tao Wang, Huaimin Wang:
iLinker: a novel approach for issue knowledge acquisition in GitHub projects. 1589-1619 - Shuai Xu

, Xiaoming Fu
, Jiuxin Cao
, Bo Liu
, Zhixiao Wang:
Survey on user location prediction based on geo-social networking data. 1621-1664 - Dongjin Yu

, Lei Zhang, Chengfei Liu, Rui Zhou, Dengwei Xu:
Automatic Web service composition driven by keyword query. 1665-1692 - Haiyun Jiang

, Yanghua Xiao, Wei Wang:
Explaining a bag of words with hierarchical conceptual labels. 1693-1713 - Zhen Chen

, Limin Shen, Feng Li, Dianlong You, Jean Pepe Buanga Mapetu:
Web service QoS prediction: when collaborative filtering meets data fluctuating in big-range. 1715-1740 - Mabrook Al-Rakhami

, Abdu Gumaei, Mohammed Abdullah Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri
, Giancarlo Fortino:
Author Correction: A lightweight and cost effective edge intelligence architecture based on containerization technology. 1741-1742 - Xiaohui Tao

, Juan Domingo Velásquez-Silva, Jiming Liu, Ning Zhong:
Editorial: Computational Social Science as the ultimate Web Intelligence. 1743-1745 - Jiayin Lin

, Geng Sun
, Tingru Cui, Jun Shen
, Dongming Xu, Ghassan Beydoun
, Ping Yu
, David Pritchard, Li Li, Shiping Chen
:
From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning. 1747-1767 - Shaofu Lin, Jiangfan Gao, Shun Zhang, Xiaobo He, Ying Sheng, Jianhui Chen:

A continuous learning method for recognizing named entities by integrating domain contextual relevance measurement and Web farming mode of Web intelligence. 1769-1790 - Khaled Albishre

, Yuefeng Li, Yue Xu, Wei Huang:
Query-based unsupervised learning for improving social media search. 1791-1809 - Ummara Ahmed Chauhan, Muhammad Tanvir Afzal

, Abdul Shahid, Moloud Abdar, Mohammad Ehsan Basiri, Xujuan Zhou
:
A comprehensive analysis of adverb types for mining user sentiments on amazon product reviews. 1811-1829 - Huiyu Min, Jiuxin Cao, Tangfei Yuan, Bo Liu

:
Topic based time-sensitive influence maximization in online social networks. 1831-1859 - Junyu Xuan

, Xiangfeng Luo, Jie Lu, Guangquan Zhang:
Web event evolution trend prediction based on its computational social context. 1861-1886 - Xiangguo Sun

, Bo Liu
, Qing Meng, Jiuxin Cao, Junzhou Luo, Hongzhi Yin
:
Group-level personality detection based on text generated networks. 1887-1906 - Zhongyi Li, Yi Jin

, Yidong Li, Congyan Lang, Songhe Feng, Tao Wang:
Learning part-alignment feature for person re-identification with spatial-temporal-based re-ranking method. 1907-1923 - Xiaorui Qin, Yanghui Rao, Haoran Xie

, Jian Yin, Fu Lee Wang:
Extractive convolutional adversarial networks for network embedding. 1925-1944 - Rongyao Hu, Xiaofeng Zhu

, Yonghua Zhu, Jiangzhang Gan:
Robust SVM with adaptive graph learning. 1945-1968 - Xiaofeng Zhu

, Jiangzhang Gan, Guangquan Lu
, Jiaye Li, Shichao Zhang:
Spectral clustering via half-quadratic optimization. 1969-1988 - Haotian Xu, Haiyun Peng, Haoran Xie

, Erik Cambria
, Liuyang Zhou, Weiguo Zheng:
End-to-End latent-variable task-oriented dialogue system with exact log-likelihood optimization. 1989-2002 - Jie Shao, Man Lung Yiu

, Masashi Toyoda:
Guest editorial: special issue on Web and big data 2019. 2003-2004 - Shuangli Shan, Zhixu Li

, Qiang Yang
, An Liu, Lei Zhao, Guanfeng Liu
, Zhigang Chen:
Geographical address representation learning for address matching. 2005-2022 - Lin Cheng, Yuliang Shi

, Kun Zhang:
Medical treatment migration behavior prediction and recommendation based on health insurance data. 2023-2042 - Yongpan Sheng

, Zenglin Xu, Yafang Wang, Gerard de Melo:
Multi-document semantic relation extraction for news analytics. 2043-2077 - Ke Zhou, Yangtao Wang

, Yu Liu, Yujuan Yang, Yifei Liu, Guoliang Li, Lianli Gao, Zhili Xiao:
A framework for image dark data assessment. 2079-2105 - Zheng Wang

, Lin Zuo, Jing Ma
, Si Chen, Jingjing Li, Zhao Kang, Lei Zhang:
Exploring nonnegative and low-rank correlation for noise-resistant spectral clustering. 2107-2127 - Yi Cai, Jianliang Xu

:
Special issue on Web information management and applications. 2129-2130 - Wei Peng, An Liu, Zhixu Li, Guanfeng Liu

, Qing Li
:
User experience-driven secure task assignment in spatial crowdsourcing. 2131-2151 - Jian Xu, Xiaoyi Fu

, Yiming Wu, Ming Luo, Ming Xu, Ning Zheng:
Personalized top-n influential community search over large social networks. 2153-2184 - Jiaxun Hua

, Yu Liu, He Chen, Xiuxia Tian, Cheqing Jin:
An enhanced wildcard-based fuzzy searching scheme in encrypted databases. 2185-2214
Volume 23, Number 4, July 2020
- Kun Hao, Junchang Xin

, Zhiqiong Wang, Guoren Wang:
Outsourced data integrity verification based on blockchain in untrusted environment. 2215-2238 - Dmytro V. Lande

, Minglei Fu
, Wen Guo, Iryna V. Balagura
, Ivan V. Gorbov
, Hongbo Yang:
Link prediction of scientific collaboration networks based on information retrieval. 2239-2257 - Yiteng Pan, Fazhi He, Haiping Yu:

Learning social representations with deep autoencoder for recommender system. 2259-2279 - Yue Qian

, Yu Liu, Xiujuan Xu, Quan Z. Sheng
:
Leveraging citation influences for Modeling scientific documents. 2281-2302 - Sabri Allani

, Taoufik Yeferny
, Richard Chbeir, Sadok Ben Yahia
:
Towards a smarter directional data aggregation in VANETs. 2303-2322 - Xinjue Wang, Ke Deng

, Jianxin Li
, Jeffrey Xu Yu, Christian S. Jensen
, Xiaochun Yang:
Efficient targeted influence minimization in big social networks. 2323-2340 - Xiaohui Tao, Thuan Pham

, Ji Zhang, Jianming Yong
, Wee Pheng Goh, Wenping Zhang, Yi Cai:
Mining health knowledge graph for health risk prediction. 2341-2362 - Xiaofei Wang, Chenyang Wang

, Xu Chen, Xiaoming Fu
, Jinyoung Han, Xin Wang:
Measurement and analysis on large-scale offline mobile app dissemination over device-to-device sharing in mobile social networks. 2363-2389 - Yu-Chuan Tsai

, Shyue-Liang Wang
, I-Hsien Ting, Tzung-Pei Hong
:
Flexible sensitive K-anonymization on transactions. 2391-2406 - Tong Wang, Yunfeng Wang, Xibo Wang, Yue Cao

:
A detailed review of D2D cache in helper selection. 2407-2428 - Haiyun Jiang, Deqing Yang, Yanghua Xiao, Wei Wang:

Understanding a bag of words by conceptual labeling with prior weights. 2429-2447 - Shangwen Lv, Longtao Huang, Liangjun Zang, Wei Zhou, Jizhong Han

, Songlin Hu
:
Yet another approach to understanding news event evolution. 2449-2470 - Yue Wang

, Chenwei Zhang, Shen Wang, Philip S. Yu, Lu Bai, Lixin Cui, Guandong Xu:
Generative temporal link prediction via self-tokenized sequence modeling. 2471-2488 - Bin Zhou, Feifei Li, Jinjun Chen, Ye Wang:

Guest editorial: special issue on data science in cyberspace 2019. 2489-2490 - Changwei Ren, Lixingjian An, Zhanquan Gu, Yuexuan Wang, Yunjun Gao:

Rebalancing the car-sharing system with reinforcement learning. 2491-2511 - Khouanetheva Pholsena, Li Pan

, Zhenpeng Zheng:
Mode decomposition based deep learning model for multi-section traffic prediction. 2513-2527 - Xixi Huang, Ye Ding, Zoe Lin Jiang, Shuhan Qi, Xuan Wang, Qing Liao

:
DP-FL: a novel differentially private federated learning framework for the unbalanced data. 2529-2545 - Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:

Processing capability and QoE driven optimized computation offloading scheme in vehicular fog based F-RAN. 2547-2565 - Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Yichen Song:

Multi-source knowledge fusion: a survey. 2567-2592 - Sijie Yang, Xiaofeng Wang

, Xiaoxue Wang, Lun An, Guizhu Zhang:
High-performance docker integration scheme based on OpenStack. 2593-2632 - Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:

Scene text reading based cloud compliance access. 2633-2647
Volume 23, Number 5, September 2020
- Xue Li

, Sen Wang
, Bohan Li:
Editorial for application-driven knowledge acquisition. 2649-2651 - Jing Jiang

, Shaoxiong Ji
, Guodong Long
:
Decentralized Knowledge Acquisition for Mobile Internet Applications. 2653-2669 - Tianxing Wu, Haofen Wang, Cheng Li, Guilin Qi, Xing Niu, Meng Wang, Lin Li, Chaomin Shi:

Knowledge graph construction from multiple online encyclopedias. 2671-2698 - Weiwei Yuan, Kangya He, Chenyang Shi, Donghai Guan, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:

Multi-view network embedding with node similarity ensemble. 2699-2714 - Lin Yue, Dongyuan Tian, Weitong Chen, Xuming Han, Minghao Yin

:
Deep learning for heterogeneous medical data analysis. 2715-2737 - Yanda Wang, Weitong Chen, Dechang Pi

, Robert Boots:
Graph augmented triplet architecture for fine-grained patient similarity. 2739-2752 - Weitong Chen, Guodong Long, Lina Yao, Quan Z. Sheng

:
AMRNN: attended multi-task recurrent neural networks for dynamic illness severity prediction. 2753-2770 - Yuni Lai

, Linfeng Zhang
, Donghong Han
, Rui Zhou, Guoren Wang:
Fine-grained emotion classification of Chinese microblogs based on graph convolution networks. 2771-2787 - Ding Xiao, Li Song, Ruijia Wang, Xiaotian Han, Yanan Cai, Chuan Shi:

Embedding geographic information for anomalous trajectory detection. 2789-2809 - Hakim Hacid, Wojciech Cellary, Hua Wang, Yanchun Zhang:

Preface to the special issue on web information systems engineering (WISE 2018). 2811-2813 - Xin Wu, Yi Cai, Qing Li, Jingyun Xu, Ho-fung Leung:

Combining weighted category-aware contextual information in convolutional neural networks for text classification. 2815-2834 - Jinyuan He, Jia Rong

, Le Sun, Hua Wang
, Yanchun Zhang, Jiangang Ma:
A framework for cardiac arrhythmia detection from IoT-based ECGs. 2835-2850 - Jeffery Ansah, Lin Liu

, Wei Kang
, Jixue Liu
, Jiuyong Li
:
Leveraging burst in twitter network communities for event detection. 2851-2876 - Peiyao Li

, Weiliang Zhao
, Jian Yang
, Quan Z. Sheng
, Jia Wu
:
Let's CoRank: trust of users and tweets on social networks. 2877-2901 - Yiming Zhou, Yuehui Han, An Liu, Zhixu Li, Hongzhi Yin

, Wei Chen, Lei Zhao
:
Extracting representative user subset of social networks towards user characteristics and topological features. 2903-2931 - Ying He

, Zhixu Li, Qiang Yang
, Zhigang Chen, An Liu, Lei Zhao, Xiaofang Zhou
:
End-to-end relation extraction based on bootstrapped multi-level distant supervision. 2933-2956 - Fuyong Zhang, Yi Wang

, Shigang Liu, Hua Wang
:
Decision-based evasion attacks on tree ensemble classifiers. 2957-2977
Volume 23, Number 6, November 2020
- Bingqing Shi, Weiguang Qu, Rubing Dai, Bin Li, Xiaohui Yan, Junsheng Zhou, Yanhui Gu

, Ge Xu:
A general strategy for researches on Chinese "的(de)" structure based on neural network. 2979-3000 - Hao Lin, Yuan Zuo, Guannan Liu, Hong Li, Junjie Wu, Zhiang Wu:

A Pseudo-document-based Topical N-grams model for short texts. 3001-3023 - Tianming Zhang, Yunjun Gao, Baihua Zheng

, Lu Chen, Shiting Wen, Wei Guo:
Towards distributed node similarity search on graphs. 3025-3053 - Wenhe Yan, Guiling Li

, Zongda Wu, Senzhang Wang, Philip S. Yu:
Extracting diverse-shapelets for early classification on time series. 3055-3081 - Weihong Han, Zhihong Tian

, Zizhong Huang, Shudong Li, Yan Jia:
Topic representation model based on microblogging behavior analysis. 3083-3097 - Jiajia Huang, Min Peng, Pengwei Li, Zhiwei Hu, Chao Xu:

Improving biterm topic model with word embeddings. 3099-3124 - Ting Zhong, Shengming Zhang

, Fan Zhou
, Kunpeng Zhang, Goce Trajcevski, Jin Wu
:
Hybrid graph convolutional networks with multi-head attention for location recommendation. 3125-3151

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














