Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Business location planning based on a novel geo-social influence diffusion model., , , , and . Inf. Sci., (2021)Topic formation and development: a core-group evolving process., , , , , and . World Wide Web, 17 (6): 1343-1373 (2014)基于社会化表示的用户性别识别 (Identifying Users' Gender via Social Representations)., , and . 计算机科学, 44 (Z11): 160-165 (2017)Scalable Time-Range k-Core Query on Temporal Graphs(Full Version)., , , , , and . CoRR, (2023)Exploit Feature and Relation Hierarchy for Relation Extraction., , and . IEEE ACM Trans. Audio Speech Lang. Process., (2022)Authorship Attribution with Very Few Labeled Data: A Co-training Approach., , , , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 657-668. Springer, (2014)Automatic Reproducible Crash Detection., , and . SATE, page 48-53. IEEE, (2016)Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVM., , , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 476-481. Springer, (2006)Inferring Lurkers' Gender by Their Interest Tags., , , and . DEXA (2), volume 9828 of Lecture Notes in Computer Science, page 263-271. Springer, (2016)BASSI: Balance and Status Combined Signed Network Embedding., , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 55-63. Springer, (2018)