Zhoujun Li

According to our database1, Zhoujun Li authored at least 282 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Differential Privacy With Bias-Control Limited Sources.
IEEE Trans. Information Forensics and Security, 2018

Landmark Image Retrieval by Jointing Feature Refinement and Multimodal Classifier Learning.
IEEE Trans. Cybernetics, 2018

Classify social image by integrating multi-modal content.
Multimedia Tools Appl., 2018

Unsupervised geographically discriminative feature learning for landmark tagging.
Knowl.-Based Syst., 2018

Response selection from unstructured documents for human-computer conversation systems.
Knowl.-Based Syst., 2018

From content to links: Social image embedding with deep multimodal model.
Knowl.-Based Syst., 2018

Marefa: Turning Publishers Catalogs' Data Into Linked Data.
Int. J. Semantic Web Inf. Syst., 2018

Response selection with topic clues for retrieval-based chatbots.
Neurocomputing, 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Generation Comp. Syst., 2018

Exploit latent Dirichlet allocation for collaborative filtering.
Frontiers Comput. Sci., 2018

Keyphrase Generation with Correlation Constraints.
CoRR, 2018

Response Generation by Context-aware Prototype Editing.
CoRR, 2018

TI-CNN: Convolutional Neural Networks for Fake News Detection.
CoRR, 2018

r-instance Learning for Missing People Tweets Identification.
CoRR, 2018

Understanding and Monitoring Human Trafficking via Social Sensors: A Sociological Approach.
CoRR, 2018

Learning Matching Models with Weak Supervision for Response Selection in Retrieval-based Chatbots.
CoRR, 2018

Ensemble Neural Relation Extraction with Adaptive Boosting.
CoRR, 2018

Assertion-based QA with Question-Aware Open Information Extraction.
CoRR, 2018

TinyVisor: An extensible secure framework on android platforms.
Computers & Security, 2018

Multi-modal kernel ridge regression for social image classification.
Appl. Soft Comput., 2018

Unrest News Amount Prediction with Context-Aware Attention LSTM.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Improved Neural Machine Translation with Chinese Phonologic Features.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Response Selection of Multi-turn Conversation with Deep Neural Networks.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Learning Joint Multimodal Representation with Adversarial Attention Networks.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Multimodal Network Embedding via Attention based Multi-view Variational Autoencoder.
Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, 2018

Ensemble Neural Relation Extraction with Adaptive Boosting.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Keyphrase Generation with Correlation Constraints.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspacem, 2018

Adversarial Learning of Answer-Related Representation for Visual Question Answering.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Distribution Distance Minimization for Unsupervised User Identity Linkage.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

Attribute Extraction by Combing Feature Ranking and Sequence Labeling.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

Learning Matching Models with Weak Supervision for Response Selection in Retrieval-based Chatbots.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Assertion-Based QA With Question-Aware Open Information Extraction.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Neural Response Generation With Dynamic Vocabularies.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Knowledge Enhanced Hybrid Neural Network for Text Matching.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data.
ACM Trans. Inf. Syst., 2017

Named entity disambiguation for questions in community question answering.
Knowl.-Based Syst., 2017

Neural Response Generation with Dynamic Vocabularies.
CoRR, 2017

A Sequential Matching Framework for Multi-turn Response Selection in Retrieval-based Chatbots.
CoRR, 2017

Learning Social Image Embedding with Deep Multimodal Attention Networks.
CoRR, 2017

Content-Based Table Retrieval for Web Queries.
CoRR, 2017

DTRP: A Flexible Deep Framework for Travel Route Planning.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Beihang-MSRA at SemEval-2017 Task 3: A Ranking System with Neural Matching Features for Community Question Answering.
Proceedings of the 11th International Workshop on Semantic Evaluation, 2017

The Arabic Knowledge Graph: Opportunities and Challenges.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

Learning Social Image Embedding with Deep Multimodal Attention Networks.
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017

Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

PPNE: Property Preserving Network Embedding.
Proceedings of the Database Systems for Advanced Applications, 2017

Semi-Supervised Network Embedding.
Proceedings of the Database Systems for Advanced Applications, 2017

HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Extracting Linked Data from HTML Tables.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

From Properties to Links: Deep Network Embedding on Incomplete Graphs.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Jointly Extracting Relations with Class Ties via Effective Deep Ranking.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

Sequential Matching Network: A New Architecture for Multi-turn Response Selection in Retrieval-Based Chatbots.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

Chinese Answer Extraction Based on POS Tree and Genetic Algorithm.
Proceedings of the 9th SIGHAN Workshop on Chinese Language Processing, 2017

Building Task-Oriented Dialogue Systems for Online Shopping.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Learning Geographical Hierarchy Features via a Compositional Model.
IEEE Trans. Multimedia, 2016

Unsupervised Head-Modifier Detection in Search Queries.
TKDD, 2016

Coranking the Future Influence of Multiobjects in Bibliographic Network Through Mutual Reinforcement.
ACM TIST, 2016

Geographical Topics Learning of Geo-Tagged Social Images.
IEEE Trans. Cybernetics, 2016

Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

Integrating multiple types of features for event identification in social images.
Multimedia Tools Appl., 2016

CPB: a classification-based approach for burst time prediction in cascades.
Knowl. Inf. Syst., 2016

A Model Guided Security Analysis Approach for Android Applications.
JSW, 2016

Security of weak secrets based cryptographic primitives via the Rényi entropy.
IET Information Security, 2016

Sequential Match Network: A New Architecture for Multi-turn Response Selection in Retrieval-based Chatbots.
CoRR, 2016

Knowledge Enhanced Hybrid Neural Network for Text Matching.
CoRR, 2016

Topic Augmented Neural Network for Short Text Conversation.
CoRR, 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

Detecting Context Dependent Messages in a Conversational Environment.
CoRR, 2016

Learning Distributed Representations of Data in Community Question Answering for Question Retrieval.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Open Domain Topic Prediction Model for Answer Selection.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

Estimating Urban Traffic Congestions with Multi-sourced Data.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Detecting Context Dependent Messages in a Conversational Environment.
Proceedings of the COLING 2016, 2016

Query Classification by Leveraging Explicit Concept Information.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

DocChat: An Information Retrieval Approach for Chatbot Engines Using Unstructured Documents.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Aggregating Inter-Sentence Information to Enhance Relation Extraction.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Improving Recommendation of Tail Tags for Questions in Community Question Answering.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Exploiting social circle broadness for influential spreaders identification in social networks.
World Wide Web, 2015

A Note on an Improved Self-Healing Group Key Distribution Scheme.
Sensors, 2015

Event detection and popularity prediction in microblogging.
Neurocomputing, 2015

Search engine reinforced semi-supervised classification and graph-based summarization of microblogs.
Neurocomputing, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Information Security, 2015

Achieving Differential Privacy with Bias-Control Limited Source.
IACR Cryptology ePrint Archive, 2015

Location Prediction of Social Images via Generative Model.
CoRR, 2015

One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015

Exploring Social Network Information for Solving Cold Start in Product Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Friendship Link Recommendation Based on Content Structure Information.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Transferable Optimal-size Fair E-cash with Optimal Anonymity.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

An Effective Approach to Measuring and Assessing the Risk of Android Application.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Location Prediction of Social Images via Generative Model.
Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, 2015

Non-malleable Extractors with Shorter Seeds and Their Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Learning Geographical Hierarchy Features for Social Image Location Prediction.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Named Entity Disambiguation Leveraging Multi-aspect Information.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Characterization of Android Applications with Root Exploit by Using Static Feature Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Learning from the past: Improving news summarization with past news articles.
Proceedings of the 2015 International Conference on Asian Language Processing, 2015

Bring User Interest to Related Entity Recommendation.
Proceedings of the Graph Structures for Knowledge Representation and Reasoning, 2015

Citywide traffic congestion estimation with social media.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015

Inferring Diffusion Networks with Sparse Cascades by Structure Transfer.
Proceedings of the Database Systems for Advanced Applications, 2015

Integrity Verification of Replicated File with Proxy in Cloud Computing.
Proceedings of the Cloud Computing and Big Data, 2015

Mining Query Subtopics from Questions in Community Question Answering.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Burst Time Prediction in Cascades.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptology ePrint Archive, 2014

Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate <1/2.
IACR Cryptology ePrint Archive, 2014

A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules.
Fuzzy Sets and Systems, 2014

Future Influence Ranking of Scientific Literature.
CoRR, 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

A novel fuzzy identity based signature scheme based on the short integer solution problem.
Computers & Electrical Engineering, 2014

Training data reduction to speed up SVM training.
Appl. Intell., 2014

Popularity Prediction of Burst Event in Microblogging.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Future Influence Ranking of Scientific Literature.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Exploiting Description Knowledge for Keyphrase Extraction.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

An Enhanced Kad Protocol Resistant to Eclipse Attacks.
Proceedings of the 9th IEEE International Conference on Networking, 2014

MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Routing table status influence of Monitoring Kad.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Fusing Multi-type Features with Distance Metric Learning for Social Image Application.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

An Improved Remote Data Possession Checking Protocol in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Question Retrieval with High Quality Answers in Community Question Answering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Exploit Latent Dirichlet Allocation for One-Class Collaborative Filtering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Concept-based Short Text Classification and Ranking.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Exploiting Timelines to Enhance Multi-document Summarization.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia.
IEEE Trans. Knowl. Data Eng., 2013

Comparable Entity Mining from Comparative Questions.
IEEE Trans. Knowl. Data Eng., 2013

Social image tagging using graph-based reinforcement on multi-type interrelated objects.
Signal Processing, 2013

New construction of affiliation-hiding authenticated group key agreement.
Security and Communication Networks, 2013

Improving image tags by exploiting web search results.
Multimedia Tools Appl., 2013

Video recommendation over multiple information sources.
Multimedia Syst., 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptology ePrint Archive, 2013

Collaborative Filtering Using Multidimensional Psychometrics Model.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Collaborative Filtering Based on Rating Psychology.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Emerging topic detection for organizations from microblogs.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Interaction-Based Social Relationship Type Identification in Microblog.
Proceedings of the Behavior and Social Computing, 2013

ZZX_MT: the BeiHang MT System for NTCIR-10 PatentMT Task.
Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies, 2013

Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Proceedings of the Network and System Security - 7th International Conference, 2013

Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Negative Influence Minimizing by Blocking Nodes in Social Networks.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

From Interest to Function: Location Estimation in Social Media.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Automatic tagging by exploring tag information capability and correlation.
World Wide Web, 2012

Tagging image by merging multiple features in a integrated manner.
J. Intell. Inf. Syst., 2012

Relationship strength estimation for online social networks with the study on Facebook.
Neurocomputing, 2012

Re-ranking with context for high-performance biomedical information retrieval.
IJDMB, 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Computers & Electrical Engineering, 2012

FSMesh - Flexibly Securing Mashups by User Defined DOM Environment.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

File Parsing Vulnerability Detection with Symbolic Execution.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

On Video Recommendation over Social Network.
Proceedings of the Advances in Multimedia Modeling - 18th International Conference, 2012

Applying adaptive over-sampling technique based on data density and cost-sensitive SVM to imbalanced learning.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

SQL Injection Detection via Program Tracing and Machine Learning.
Proceedings of the Internet and Distributed Computing Systems, 2012

Bootstrap Sampling Based Data Cleaning and Maximum Entropy SVMs for Large Datasets.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

Personalized video recommendation based on viewing history with the study on YouTube.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

A Semi-Supervised Bayesian Network Model for Microblog Topic Classification.
Proceedings of the COLING 2012, 2012

Who are More Influential Spreaders? Users with Broader Social Circle or with More Friends?
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

When Sparsity Meets Noise in Collaborative Filtering.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wireless Communications and Mobile Computing, 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Mining and modeling linkage information from citation context for improving biomedical literature retrieval.
Inf. Process. Manage., 2011

Question-Oriented Answer Summarization via Term Hierarchical Structure.
International Journal of Software Engineering and Knowledge Engineering, 2011

Toward an Accurate Snapshot of DHT Networks.
IEEE Communications Letters, 2011

The Construction of Fuzzy Concept Lattices Based on (θ, σ)-Fuzzy Rough Approximation Operators.
Fundam. Inform., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Computers & Security, 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Computer Communications, 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Computers & Mathematics with Applications, 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments.
Comput. J., 2011

Promoting ranking diversity for genomics search with relevance-novelty combined model.
BMC Bioinformatics, 2011

Tagging Image by Exploring Weighted Correlation between Visual Features and Tags.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

Program Slicing Stored XSS Bugs in Web Application.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

A Graph-based Bilingual Corpus Selection Approach for SMT.
Proceedings of the 25th Pacific Asia Conference on Language, Information and Computation, 2011

ZZX_MT: the BeiHang MT System for NTCIR-9 PatentMT Task.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

Integrating rich information for video recommendation with multi-task rank aggregation.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Improved Graph-Based Bilingual Corpus Selection with Sentence Pair Ranking for Statistical Machine Translation.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

An online video recommendation framework using rich information.
Proceedings of the ICIMCS 2011, 2011

Image Tagging by Exploiting Feature Correlation.
Proceedings of the Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, 2011

Online MOACO biclustering of microarray data.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Probabilistic Image Tagging with Tags Expanded By Text-Based Search.
Proceedings of the Database Systems for Advanced Applications, 2011

Learning to recommend questions based on public interest.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Multiobjective optizition shuffled frog-leaping biclustering.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

Promoting Ranking Diversity for Biomedical Information Retrieval Based on LDA.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

Tagging Image with Informative and Correlative Tags.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Using Concept-Level Random Walk Model and Global Inference Algorithm for Answer Summarization.
Proceedings of the Information Retrieval Technology, 2011

User Preference Representation Based on Psychometric Models.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

An Iterative Method for Generating Loop Invariants.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
IJSN, 2010

MOACO Biclustering of gene expression data.
I. J. Functional Informatics and Personalised Medicine, 2010

Automatic Topic Detection with an Incremental Clustering Algorithm.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Improving Diversity of Focused Summaries through the Negative Endorsements of Redundant Facts.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

A Novel Composite Kernel for Finding Similar Questions in CQA Services.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

A survival modeling approach to biomedical search result diversification using wikipedia.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Automated Program Verification Using Generation of Invariants.
Proceedings of the 10th International Conference on Quality Software, 2010

A Method for Mobile User Profile and Reasoning.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

The topic-perspective model for social tagging systems.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Solving Course Timetabling Problem Using Interrelated Approach.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

A context approach to measuring similarity between questions in the community-based QA services.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Answer summarization via term hierarchical structure.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia.
Proceedings of the Advances in Information Retrieval, 2010

User's Latent Interest-Based Collaborative Filtering.
Proceedings of the Advances in Information Retrieval, 2010

A relevance-novelty combined model for genomics search result diversification.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine, 2010

A Tree Graph Model Based on Mobile Environment.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Comparable Entity Mining from Comparative Questions.
Proceedings of the ACL 2010, 2010

2009
Design of Collaborative Platform on Clustering Applications for Governments.
Intelligent Information Management, 2009

A New Method for Calculating Similarity between Sentences and Application on Automatic Abstracting.
Intelligent Information Management, 2009

Digital multisignature on the generalized conic curve over Zn.
Computers & Security, 2009

Biclustering of microarray data with MOSPO based on crowding distance.
BMC Bioinformatics, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Constructing Program Invariants via Solving QBF.
Proceedings of the TASE 2009, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction.
Proceedings of the Advances in Neural Networks, 2009

A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Microarray Data Biclustering with Multi-objective Immune Optimization Algorithm.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Multi-objective ant colony optimization biclustering of microarray data.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Predicting gene function with positive and unlabeled examples.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

BioCLink: A Probabilistic Approach for Improving Genomics Search with Citation Links.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Towards a Better Ranking for Biomedical Information Retrieval Using Context.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Microarray Biclustering with Crowding Based MOACO.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Online New Event Detection Based on IPLSA.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

Simplifying Buffer Overflow Detection Using Site-Safe Expressions.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Electr. Notes Theor. Comput. Sci., 2008

A Novel Derivation Framework For Definite Logic Program.
Electr. Notes Theor. Comput. Sci., 2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Electr. Notes Theor. Comput. Sci., 2008

Cryptanalysis of simple three-party key exchange protocol.
Computers & Security, 2008

Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

A Digital Signature Scheme on the Conic Curve over Zn Based on Two Hard Problems.
Proceedings of the PACIIA 2008, 2008

A distributed topology-aware overlays construction algorithm.
Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29, 2008

Misusing Kademlia Protocol to Perform DDoS Attacks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

An Example-based Decoder for Spoken Language Machine Translation.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

VM-based Architecture for Network Monitoring and Analysis.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Research on Mixture Language Model-based Document Clustering.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Multi-objective Evolutionary Algorithm for Mining 3D Clusters in Gene-sample-time Microarray Data.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

A Novel Unsupervised Feature Selection Method for Bioinformatics Data Sets through Feature Clustering.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Improving Information Retrieval within Language Model Framework by Integrating Adjacent and Distant Relation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

Timed Component-Interaction Automata for Specification and Verification of Real-Time Reactive Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Multi-objective Particle Swarm Optimization Biclustering of Microarray Data.
Proceedings of the 2008 IEEE International Conference on Bioinformatics and Biomedicine, 2008

Similar Sentence Retrieval for Machine Translation Based on Word-Aligned Bilingual Corpus.
Proceedings of the Information Retrieval Technology, 2008

2007
A Description Logic Framework for Semantic Web Service Composition.
Proceedings of the Third International Conference on Semantics, 2007

An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

An Integrated Reordering Model for Statistical Machine Translation.
Proceedings of the MICAI 2007: Advances in Artificial Intelligence, 2007

NUDT machine translation system for IWSLT2007.
Proceedings of the 2007 International Workshop on Spoken Language Translation, 2007

Research of Routing Algorithm in Hierarchy-Adaptive P2P Systems.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Hamiltonicity and Pancyclicity of Binary Recursive Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Diameter bounds of cubelike recursive networks.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

A Survey of Fuzzy Decision Tree Classifier Methodology.
Proceedings of the Fuzzy Information and Engineering, 2007

Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Hamiltonian Property on Binary Recursive Networks.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Ontology Based Clustering for Improving Genomic IR.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007

Model Checking for BPEL4WS with Time.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

A New Method of Cluster-Based Topic Language Model for Genomic IR.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Supporting Connector in Programming Language.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A New Component-Oriented Programming Language with the First-Class Connector.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

Minimum Redundancy Gene Selection Based on Grey Relational Analysis.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems.
Proceedings of the High Performance Computing and Communications, 2006

Gene Selection for Classifying Microarray Data Using Grey Relation Analysis.
Proceedings of the Discovery Science, 9th International Conference, 2006

2004
Fast Mining Maximal Frequent ItemSets Based on FP-Tree.
Proceedings of the Conceptual Modeling, 2004

Mining Maximal Frequent ItemSets Using Combined FP-Tree.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

2003
A Proof Assistant for Mobile Processes.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

1999
Universal abstract consistency class and universal refutation.
J. Comput. Sci. Technol., 1999

Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1999

1998
Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the pi-Calculus.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998


  Loading...