Author of the publication

Chinese Hedge Scope Detection Based on Structure and Semantic Information.

, , , , , and . CCL, volume 10035 of Lecture Notes in Computer Science, page 204-215. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting syntactic and semantics information for chemical-disease relation extraction., , , , , and . Database, (2016)Chinese Hedge Scope Detection Based on Structure and Semantic Information., , , , , and . CCL, volume 10035 of Lecture Notes in Computer Science, page 204-215. (2016)Active Semi-supervised Approach for Checking App Behavior against Its Description., , , , and . COMPSAC, page 179-184. IEEE Computer Society, (2015)Fair deposits against double-spending for Bitcoin transactions., , , and . DSC, page 44-51. IEEE, (2017)TinyVisor: An extensible secure framework on android platforms., , , , and . Computers & Security, (2018)Privacy-Preserving Remote User Authentication with k-Times Untraceability., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 647-657. Springer, (2018)No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption., , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 72-86. Springer, (2012)Remote attestation on program execution., , , , and . STC, page 11-20. ACM, (2008)Efficient block-based transparent encryption for H.264/SVC bitstreams., , , and . Multimedia Syst., 20 (2): 165-178 (2014)Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems., , and . Computer Communications, 17 (2): 83-93 (1994)