Aiping Li

According to our database1, Aiping Li authored at least 101 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Multi-source knowledge fusion: a survey.
World Wide Web, 2020

A Multi-Attention Matching Model for Multiple-Choice Reading Comprehension.
Int. J. Cooperative Inf. Syst., 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

Knowledge-Infused Pre-trained Models for KG Completion.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Striking a Balance in Unsupervised Fine-Grained Domain Adaptation Using Adversarial Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Review of APT Attack Detection Methods and Defense Strategies.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An Advanced BERT-Based Decomposition Method for Joint Extraction of Entities and Relations.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Parallel Algorithm for Graph Transaction Based Frequent Subgraph Mining.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Survey on Approaches and Applications of Knowledge Representation Learning.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Knowledge Graph Embedding Method Based on Neural Network.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
A method for achieving provable data integrity in cloud computing.
J. Supercomput., 2019

MILDMS: Multiple Instance Learning via DD Constraint and Multiple Part Similarity.
Symmetry, 2019

Scalability in manufacturing systems: a hybridized GA approach.
J. Intell. Manuf., 2019

A hybrid CNN-LSTM model for typhoon formation forecasting.
GeoInformatica, 2019

Deep Entity Linking via Eliminating Semantic Ambiguity With BERT.
IEEE Access, 2019

Deep Feature Fusion Multiple Instance Learning for WaDang Recognition.
IEEE Access, 2019

Person Entity Attribute Extraction Based on Siamese Network.
IEEE Access, 2019

Needle in a Haystack: Attack Detection from Large-Scale System Audit.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Few-shot Knowledge Reasoning Method based on Attention Mechanism.
Proceedings of the ICCPR '19: 8th International Conference on Computing and Pattern Recognition, 2019

Research of Trojan Attack Effect Evaluation Based on FAHP.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-source Knowledge Fusion: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Intrusion Detection Results Analysis Based on Variational Auto-Encoder.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Fusion: Introduction of Concepts and Techniques.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FSM-Based Cyber Security Status Analysis Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Joint Extraction of Entities and Relations Based on Multi-label Classification.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Kinematic Characteristics Analysis of Cooperative Welding Robot with Multiple Manipulators.
Proceedings of the 4th Asia-Pacific Conference on Intelligent Robot Systems, 2019

2018
Topics' popularity prediction based on ARMA model.
Proceedings of 2018 International Conference on Mathematics and Artificial Intelligence, 2018

A Practical Approach to Answer Extraction for Constructing QA Solution.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

Attention-based encoder-decoder model for answer selection in question answering.
Frontiers Inf. Technol. Electron. Eng., 2017

Real-time personalized twitter search based on semantic expansion and quality model.
Neurocomputing, 2017

Neural Network Based Web Log Analysis for Web Intrusion Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Preventive maintenance planning in a unreliable production line with a branch buffer.
Proceedings of the 2017 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, 2017

A Framework to Construct Knowledge Base for Cyber Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
多特征层次化答案质量评价方法研究 (Research on Multi-features Hierarchical Answer Quality Evaluation Method).
计算机科学, 2016

Identifying users across social networks based on dynamic core interests.
Neurocomputing, 2016

Combining Deep Learning with Information Retrieval for Question Answering.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Probabilistic n-of-N skyline computation over uncertain data streams.
World Wide Web, 2015

Community structure mining in big data social media networks with MapReduce.
Clust. Comput., 2015

Spammer Detection on Online Social Networks Based on Logistic Regression.
Proceedings of the Web-Age Information Management, 2015

NUDTSNA at TREC 2015 Microblog Track: A Live Retrieval System Framework for Social Network based on Semantic Expansion and Quality Model.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Answer Quality Assessment in CQA Based on Similar Support Sets.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015

Model and Comparison of Membership Testing Approach for Massive Data.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach.
IEEE Trans. Knowl. Data Eng., 2014

Optimization of process planning for cylinder block based on feature machining elements.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Characterized by Subjective Clues on Subjective Text Recognition.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

Synergistic partitioning in multiple large scale social networks.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

Demographic Prediction of Online Social Network Based on Epidemic Model.
Proceedings of the Web Technologies and Applications, 2014

An Advanced Spam Detection Technique Based on Self-adaptive Piecewise Hash Algorithm.
Proceedings of the Web Technologies and Applications, 2014

Analysis on Chinese Microblog Sentiment Based on Syntax Parsing and Support Vector Machine.
Proceedings of the Web Technologies and Applications, 2014

Microblog Sentiment Analysis Model Based on Emoticons.
Proceedings of the Web Technologies and Applications, 2014

Identifying Users Based on Behavioral-Modeling across Social Media Sites.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

A Parallel and Scalable Framework for Non-overlapping Community Detection Algorithms.
Proceedings of the Web Technologies and Applications, 2014

The Research of Partitioning Model Based on Virtual Identity Data.
Proceedings of the Web Technologies and Applications, 2014

2013
Microblog Sentiment Classification Based on Supervised and Unsupervised Combination.
Proceedings of the Trustworthy Computing and Services, 2013

A structure free self-adaptive piecewise hashing algorithm for spam filtering.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

A MapReduce and Information Compression Based Social Community Structure Mining Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

An Efficient Approach on Answering Top-k Queries with Grid Dominant Graph Index.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Study on Transformed Keywords Identification in Spam Filtering.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

General Spatial Skyline Operator.
Proceedings of the Database Systems for Advanced Applications, 2012

2011
Economic production quantity model research based on facility layout planning.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Research and optimization of reconfigurable manufacturing system configuration based on system reliability.
Kybernetes, 2010

Gait analysis of powered bionic lower prosthesis.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Study on Cost-Sensitive Communication Models on Large-scale Monitor Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Research on Broken Mappings Detecting Method Based on Fuzzy Aggregation Operators in Deep Web Integration Environment.
Proceedings of the International Conference on E-Business and E-Government, 2010

A Chinese Synonyms Reduced Algorithm Based on Sememe Tree.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
The Sampling Synchronization of the Chaotic System with Different Structures Based on T-S Model.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Knowledge Fusion and Evaluation System with Fusion-Knowledge Measure.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Online Classification Algorithm for Data Streams Based on Fast Iterative Kernel Principal Component Analysis.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Research on Cost-Sensitive Communication Models over Distributed Data Streams Processing.
Proceedings of the First International Conference on Advances in Databases, 2009

2008
A Cost-Efficient Method for Continuous Top-k Processing over Data Stream.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Finding Correlated Item Pairs through Efficient Pruning with a Given Threshold.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Research on Communication-Efficient Method for Distributed Threshold Monitoring.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

AGV Dispatching Strategy Based on Theory of Constraints.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

2007
Harmonic Triangular Norm Aggregation Operators in Multicriteria Decision Systems.
J. Convergence Inf. Technol., 2007

A Study on Organizational Knowledge in Multi-Agent System.
J. Convergence Inf. Technol., 2007

Detecting Broken Mappings for Deep Web Integration.
Proceedings of the Third International Conference on Semantics, 2007

Product scheduling and manufacturing line reconfiguration using Petri Nets and heuristic search.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Analysis and research of system configuration and economic evaluation of reconfigurable manufacturing system.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Continuous monitoring of skyline query over highly dynamic moving objects.
Proceedings of the Sixth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2007

DRN: A CORBA-Based Distributed Resource Navigation System for Data Grid.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Security Model for Networked Manufacturing System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Continuous Skyline Tracking on Update Data Streams.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Research on Prediction Models over Distributed Data Streams.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Learning fuzzy logic based intelligent determination of feedrate for end milling operation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Internet-based Platform for an Integrated Design of Product and Manufacturing Process for SMEs.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

2004
On Aggregation Operators for Fuzzy Information Sources.
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004

2003
A Rule Induction Method of Plant Disease Description Based on Rough Sets.
Proceedings of the Rough Sets, 2003


  Loading...