Author of the publication

Research on online emotion of COVID-19 based on text sentiment analysis.

, , , and . Int. J. Comput. Sci. Eng., 25 (4): 460-466 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

i-m-Space: interactive multimedia-enhanced space for rehabilitation of breast cancer patients., , , , , , , , , and 9 other author(s). ACM Multimedia, page 623-626. ACM, (2010)Iterative multiple sequence labeling with classifier combination., , and . NLPKE, page 397-400. IEEE, (2011)Research on Efficient Dynamic Cloud Storage Ciphertext Access Control., , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 297-303. Springer, (2013)The Implementation of GFP Protocol Based on EOS in FPGA., , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 274-280. Springer, (2014)A Differentially Private Trajectory Publishing Mechanism Based on Stay Points., , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 245-257. Springer, (2019)Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis., , , , , , , and . IEEE Access, (2018)More Modalities Mean Better: Vessel Target Recognition and Localization Through Symbiotic Transformer and Multiview Regression., , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)Using Dependency Information to Enhance Attention Mechanism for Aspect-Based Sentiment Analysis., , , , and . NLPCC (1), volume 11838 of Lecture Notes in Computer Science, page 672-684. Springer, (2019)A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks., , , , and . J. Softw., 6 (12): 2434-2440 (2011)Maximizing destructiveness of node capture attack in wireless sensor networks., , , and . J. Supercomput., 71 (8): 3181-3212 (2015)