Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Theft Malware Detection with Privacy Petri Net., , , and . PDCAT, page 195-200. IEEE, (2012)Identifying vulgar content in eMule network through text classification., , , , and . ISI, page 168. IEEE, (2010)Learning to Predict Links by Integrating Structure and Interaction Information in Microblogs., , and . J. Comput. Sci. Technol., 30 (4): 829-842 (2015)BTM: Topic Modeling over Short Texts., , , and . IEEE Trans. Knowl. Data Eng., 26 (12): 2928-2941 (2014)WonGoo: A Peer-to-Peer Protocol for Anonymous Communication., , , and . PDPTA, page 1102-1106. CSREA Press, (2004)Text Feature Ranking Based on Rough-set Theory., , and . Web Intelligence, page 659-662. IEEE Computer Society, (2007)SentiRank: Cross-Domain Graph Ranking for Sentiment Classification., , , , , and . Web Intelligence, page 309-314. IEEE Computer Society, (2009)A Fast and Accurate Method for Bilingual Opinion Lexicon Extraction., , and . Web Intelligence, page 50-57. IEEE Computer Society, (2012)Learning Topics in Short Texts by Non-negative Matrix Factorization on Term Correlation Matrix., , , , and . SDM, page 749-757. SIAM, (2013)A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic Wireless Multi-hop Mobile Networks., , , , and . JNW, 8 (5): 985-990 (2013)