Author of the publication

A Hidden Astroturfing Detection Approach Base on Emotion Analysis.

, , , , , , , , and . KSEM, volume 10412 of Lecture Notes in Computer Science, page 55-66. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tolerance granular computing towards incomplete information system., , , and . Int. J. Granul. Comput. Rough Sets Intell. Syst., 2 (1): 10-22 (2011)Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding., , , , , , , , , and . Int. J. Intell. Syst., 36 (5): 2323-2346 (2021)Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization., , , , , , and . J. Netw. Comput. Appl., (2014)A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things., , , , , , and . IEEE Trans. Green Commun. Netw., 5 (2): 645-657 (2021)Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View., , , , , , , , and . J. Comput. Sci. Technol., 36 (5): 1002-1021 (2021)Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems., , , , , , and . IEEE Access, (2017)Curbing collusive cyber-gossips for business brand management., , , , and . Enterp. Inf. Syst., 11 (10): 1457-1461 (2017)A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning., , , , and . J. Circuits Syst. Comput., 30 (13): 2150229:1-2150229:21 (2021)Semantic Filtering for DDL-Based Service Composition., , , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 778-787. Springer, (2008)Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks., , , , , , and . J. Netw. Comput. Appl., (2014)