Zhuang Yan

Orcid: 0000-0002-5449-024X

According to our database1, Zhuang Yan authored at least 34 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LCA-BERT: A Local and Context Fusion Sentiment Analysis Model Based on BERT.
IAIC (2), 2023

2018
A High-precision Dynamic Indoor Localization Algorithm Based on UWB Technology.
Proceedings of the 2018 Ubiquitous Positioning, 2018

2016
Hierarchical classification in text mining for sentiment analysis of online news.
Soft Comput., 2016

Fuzzy Aspect Based Opinion Classification System for Mining Tourist Reviews.
Adv. Fuzzy Syst., 2016

2015
A Design of Floating Vehicle Data Acquisition System Based-on ZigBee.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5.
Proceedings of the Artificial Intelligence Research and Development, 2015

Online registration system for recreational cycling marathons: Lessons learned.
Proceedings of the Artificial Intelligence Research and Development, 2015

A Data Modification Technique in PPDM Based on Ant Colony Optimization Approach.
Proceedings of the Artificial Intelligence Research and Development, 2015

Hidden Markov Model Based Character Segmentation Factor Applied To Urdu Script.
Proceedings of the Artificial Intelligence Research and Development, 2015

2013
Selecting Optimal Feature Set in High-Dimensional Data by Swarm Search.
J. Appl. Math., 2013

2012
Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Quantitative analysis of trust factors on social network using data mining approach.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Analysis of general opinions about Sina Weibo micro-blog real-name verification system.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

Not every friend on a social network can be trusted: Classifying imposters using decision trees.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

2011
Information Sharing over Collaborative Social Networks Using XACML.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Mixed Programming between MATLAB and Other Programming Languages.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2009
Decision-Support for Optimizing Supply Chain Formation Based on CSET Model.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Design of a web-based tendering system for e-government procurement.
Proceedings of the ICEGOV 2009, 2009

2008
Knowledge-empowered automated negotiation system for e-Commerce.
Knowl. Inf. Syst., 2008

Comparative Study on M-Commerce Applications in Various Scenarios.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

User Acceptance Testing of Mobile Payment in Various Scenarios.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Applying Pareto-Optimal and JIT Techniques for Supply Chains.
Proceedings of the 8th International Conference on Hybrid Intelligent Systems (HIS 2008), 2008

2007
Knowledge-Empowered Automated Negotiation System for B2B e-Commerce.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

A Model of B2B Negotiation using Knowledge.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Applying Knowledge Beads for Automated Negotiation.
Proceedings of the ICE-B 2007, 2007

A Hybrid GA-based Collaborative Filtering Model for Online Recommenders.
Proceedings of the ICE-B 2007, 2007

Incorporating Knowledge into e-Commerce Automated Negotiation.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Logical Model for Detecting Irregular Actions in Physical Access Environment.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Security Model for Detecting Suspicious Patterns in Physical Environment.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2004
On Designing a Flexible E-Payment System with Fraud Detection Capability.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Negotiation Paradigms Based on Knowledge Bead's Methodology.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

Negotiation Paradigms for E-Commerce Agents using Knowledge Beads Methodology.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003

Automated Negotiation with Multiple Concept-based Alternatives in Multi-agent Systems.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003


  Loading...