Author of the publication

A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network.

, , , , and . J. Inf. Sci. Eng., 37 (4): 959-974 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (6): 3337-3348 (2021)An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network., , , , and . IEEE Access, (2018)TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning., , , , and . CoRR, (2024)A Heterogeneous Graph Learning Model for Cyber-Attack Detection., , , , , and . CoRR, (2021)One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices., , , , , , , and . IEEE Trans. Fuzzy Syst., 30 (5): 1421-1435 (2022)TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction., , , , , and . SMC, page 1217-1223. IEEE, (2023)CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters., , , and . Comput. Secur., (January 2024)Mining cell-id trajectory patterns by exploiting handoff features., , , and . UbiComp Adjunct, page 153-156. ACM, (2016)Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features., , , , and . Inf. Sci., (2019)