Author of the publication

Training attractive attribute classifiers based on opinion features extracted from review data.

, , and . Electron. Commer. Res. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying specifications with associated attributes in graph transformation systems., , , and . Frontiers Comput. Sci., 9 (3): 364-374 (2015)基于线性时间算法的故障树模块扩展分解方法 (Fault Tree Module Expansion Decomposition Method Based on Liner-time Algorithm)., and . 计算机科学, 46 (1): 226-231 (2019)基于双格的软件产品线模型检测 (Model Checking of Software Product Line Based on Bilattices)., , and . 计算机科学, 42 (2): 167-172 (2015)Accelerating Public Key Cryptography in Android Platforms., , , , , , and . BigCom, page 245-249. IEEE, (2019)Evaluating knowledge management capability of organizations: a fuzzy linguistic method., , , and . Expert Syst. Appl., 36 (2): 3346-3354 (2009)DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 2872-2884 (2021)A Lightweight NFT Auction Protocol for Cross-chain Environment., , and . ML4CS (1), volume 13655 of Lecture Notes in Computer Science, page 133-146. Springer, (2022)Abstraction for Verification and Refutation in Model Checking.. University of Toronto, Canada, (2010)A zero trust and blockchain-based defense model for smart electric vehicle chargers., , , , , and . J. Netw. Comput. Appl., (April 2023)Identification and Counter Abstraction for Full Virtual Symmetry., , and . CHARME, volume 3725 of Lecture Notes in Computer Science, page 285-300. Springer, (2005)