Author of the publication

CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.

, , , , , and . WCNC, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering., , , , , , and . CSCWD, page 406-413. IEEE, (2022)网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace)., , , and . 计算机科学, 45 (6): 9-18 (2018)TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network., , , , , , , and . Cybersecur., 5 (1): 8 (2022)Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain., , , , , and . CSCWD, page 909-916. IEEE, (2023)Towards Comprehensive Detection of DNS Tunnels., , , , , and . ISCC, page 1-7. IEEE, (2020)TIM: threat context-enhanced TTP intelligence mining on unstructured threat data., , , , , , , and . Cybersecur., 5 (1): 3 (2022)FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction., , , , , , , and . SEKE, page 79-85. KSI Research Inc., (2021)CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce., , , , , and . WCNC, page 1-6. IEEE, (2021)Simplified-Xception: A New Way to Speed Up Malicious Code Classification., , , , , , and . CSCWD, page 582-587. IEEE, (2023)Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention., , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1796-1803. IEEE, (2022)