Jin Xu

According to our database1, Jin Xu authored at least 11 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Emergency Analysis Based on Affective Computing in Universities Forum.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Short Text Topic Recognition and Optimization Method for University Online Community.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Hot Event Detection for Social Media Based on Keyword Semantic Information.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Hybrid Text Topic Discovery Method for Multi-source Information.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Mining Friendships Based on Bipartite Network Though Campus Spatiotemporal Feature.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

Efficient Identity-Based Offline/Online Encryption Scheme for Lightweight Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2016
A Topic Label Extraction Method for the University BBS.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2014
A Method to Build and Expand the Domain Dictionary Automatically Based on WordNet.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Domain-Specific Semantic Retrieval of Institutional Repository Based on Query Extension.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Research of eID Mobile Identity Authentication Method.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014


  Loading...