Author of the publication

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF.

, , , , , and . Frontiers of IT & EE, 20 (6): 872-884 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lighting virtual objects in a single image via coarse scene understanding., , and . SCIENCE CHINA Information Sciences, 57 (9): 1-14 (2014)Research on Social Network Structure and Public Opinions Dissemination of Micro-blog Based on Complex Network Analysis., and . JNW, 8 (7): 1543-1550 (2013)A general framework for efficient clustering of large datasets based on activity detection., , , , and . Statistical Analysis and Data Mining, 4 (1): 11-29 (2011)A typology of net-enabled organisational capabilities for digital competitive advantage: the case study of travel and hospitality industry in China., , and . IJNVO, 12 (1): 56-69 (2013)RankCompete: Simultaneous ranking and clustering of information networks., , , , , , and . Neurocomputing, (2012)Dynamic Channel Allocation for Mobile Cellular Systems Using a Control Theoretical Approach., , , , and . IEICE Transactions, 89-B (2): 621-624 (2006)Cancer classification from serial analysis of gene expression with event models., , and . Appl. Intell., 29 (1): 35-46 (2008)Random Forest and PCA for Self-Organizing Maps based Automatic Music Genre Discrimination., and . DMIN, page 414-417. CSREA Press, (2006)A QoS-Aware Interference Balancing Scheme for Multiuser MIMO Systems., , , , , and . VTC Spring, IEEE, (2009)Wavelet-based feature extraction using probabilistic finite state automata for pattern classification., , , and . Pattern Recognition, 44 (7): 1343-1356 (2011)