Meijuan Yin

Orcid: 0000-0002-0066-1971

According to our database1, Meijuan Yin authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IP2vec: an IP node representation model for IP geolocation.
Frontiers Comput. Sci., December, 2024

2023
Entity Attribute Alignment Method Based On Attribute Value Distribution.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

User entity alignment method based on cross-attribute knowledge association.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023

2021
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation.
Secur. Commun. Networks, 2020

A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network.
KSII Trans. Internet Inf. Syst., 2020

An Evaluation Algorithm of the Importance of Network Node Based on Community Influence.
Proceedings of the Data Mining and Big Data - 5th International Conference, 2020

2019
Street-Level Landmark Evaluation With Upper Error Bound.
IEEE Access, 2019

Multi-source Landmark Fusion based on Machine Learning.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Truth discovery on multi-dimensional properties of data sources.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Disseminating Quality-Based Analysis of Microblog Users' Influencing Ability.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
一种基于属性哈希的告警日志去重方法 (Method of Duplicate Removal on Alert Logs Based on Attributes Hashing).
计算机科学, 2016

2013
A System for Extracting and Ranking Name Aliases in Emails.
J. Softw., 2013

Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction.
Proceedings of the Ninth International Conference on Natural Computation, 2013

An improved affinity propagation clustering algorithm for large-scale data sets.
Proceedings of the Ninth International Conference on Natural Computation, 2013

A flag simulation strategy based on fusion of semantic trees in binary translation.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Data recovery of user-defined procedures in binary translation.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2011
Automatically locating salutation and signature blocks in emails.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011


  Loading...