Author of the publication

Feature Representation Models for Cyber Attack Event Extraction.

, , and . WI Workshops, page 29-32. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constitutive Relation Analysis for V+N Phrases.. Journal of Chinese Language and Computing, 15 (3): 173-184 (2005)Ontology of human relation extraction based on dependency syntax rules., and . WI, page 1151-1157. ACM, (2017)SELC: a self-supervised model for sentiment classification., , , and . CIKM, page 929-936. ACM, (2009)Word Segmentation for Chinese Novels., and . AAAI, page 2440-2446. AAAI Press, (2015)ZORE: A Syntax-based System for Chinese Open Relation Extraction., and . EMNLP, page 1870-1880. ACL, (2014)Multi-view Chinese Treebanking., , , and . COLING, page 257-268. ACL, (2014)SESS: A Self-Supervised and Syntax-Based Method for Sentiment Classification., , , and . PACLIC, page 596-605. City University of Hong Kong Press, (2009)A Hypothesis on Word Similarity and Its Application., , , and . CLSW, volume 8922 of Lecture Notes in Computer Science, page 317-325. Springer, (2014)Building a dictionary on constituent structure of Chinese compounds., , and . NLPKE, page 1-8. IEEE, (2009)A Method for Automatic POS Guessing of Chinese Unknown Words., , and . COLING, page 705-712. (2008)