Yonghong Xie

Orcid: 0000-0002-3398-6262

According to our database1, Yonghong Xie authored at least 43 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A multi-type semantic interaction and enhancement method for tax question understanding.
Eng. Appl. Artif. Intell., 2024

GP-FMLNet: A feature matrix learning network enhanced by glyph and phonetic information for Chinese sentiment analysis.
CAAI Trans. Intell. Technol., 2024

2022
Incremental neighborhood entropy-based feature selection for mixed-type data under the variation of feature set.
Appl. Intell., 2022

2021
Traditional Chinese medicine symptom normalization approach leveraging hierarchical semantic information and text matching with attention mechanism.
J. Biomed. Informatics, 2021

Label distribution feature selection for multi-label classification with rough set.
Int. J. Approx. Reason., 2021

2020
Incremental feature selection for dynamic hybrid data using neighborhood rough set.
Knowl. Based Syst., 2020

Deep successor feature learning for text generation.
Neurocomputing, 2020

Multi-label feature selection based on label distribution and feature complementarity.
Appl. Soft Comput., 2020

Improving Distantly-Supervised Named Entity Recognition for Traditional Chinese Medicine Text via a Novel Back-Labeling Approach.
IEEE Access, 2020

Bi-Modal Learning With Channel-Wise Attention for Multi-Label Image Classification.
IEEE Access, 2020

2019
Incremental approaches for feature selection from dynamic data with the variation of multiple objects.
Knowl. Based Syst., 2019

An Efficient Uncertainty Measure-based Attribute Reduction Approach for Interval-valued Data with Missing Values.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2019

Knowledge Acquisition Approach Based on Incremental Objects From Data With Missing Values.
IEEE Access, 2019

Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
A wireless sensor data-based coal mine gas monitoring algorithm with least squares support vector machines optimized by swarm intelligence techniques.
Int. J. Distributed Sens. Networks, 2018

Personalized Diagnostic Modal Discovery of Traditional Chinese Medicine Knowledge Graph.
Proceedings of the 14th International Conference on Natural Computation, 2018

Semantic Feature Expansion Technology Based on Knowledge Map.
Proceedings of the 14th International Conference on Natural Computation, 2018

2017
Reverse direction-based surrounder queries for mobile recommendations.
World Wide Web, 2017

A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data.
Sci. Program., 2017

Structural technology research on symptom data of Chinese medicine.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
A Novel Prediction Scheme for Hot Rolled Strip Thickness Based on Extreme Learning Machine.
Proceedings of the Cognitive Systems and Signal Processing, 2016

2015
Feature Selection using Compact Discernibility Matrix-based Approach in Dynamic Incomplete Decision System.
J. Inf. Sci. Eng., 2015

Processing Skyline Groups on Data Streams.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Disease Diagnosis Supported by Hierarchical Temporal Memory.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Reverse Direction-Based Surrounder Queries.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Personalized Privacy Aware Framework for Moving Objects in Participatory Sensing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Design and Implementation of Privacy-preserving Recommendation System Based on MASK.
J. Softw., 2014

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Commun., 2014

The Core Drugs Analysis based on Social Network Analysis about Traditional Chinese Medicine Records Semantic Relation.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Analysis of two knapsack public key cryptosystems.
IET Commun., 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013

A dynamic attribute reduction algorithm based on compound attribute measure.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

A rule extraction algorithm based on compound attribute measure in decision systems.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

2012
A matrix construction of Boolean functions with maximum algebraic immunity.
J. Syst. Sci. Complex., 2012

2011
Predicting protein second structure using a novel hybrid method.
Expert Syst. Appl., 2011

Cube Cryptanalysis of Hitag2 Stream Cipher.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2009
RBFCM Based Heuristic Coordinator Algorithm for KDD.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Mining Multi-relational Frequent Patterns in Data Streams.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2003
Randomised hough transform with error propagation for line and circle detection.
Pattern Anal. Appl., 2003

2002
A New Efficient Ellipse Detection Method.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
Effective line detection with error propagation.
Proceedings of the 2001 International Conference on Image Processing, 2001


  Loading...