Author of the publication

Latent Dirichlet Allocation with Residual Convolutional Neural Network Applied in Evaluating Credibility of Chinese Listed Companies.

, , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction Intervals for an Ordered Observation from Weibull Distribution Based on Censored Samples., , and . Communications in Statistics - Simulation and Computation, 38 (2): 288-307 (2009)Photoluminescence Study of the Photoinduced Phase Separation in Mixed-Halide Hybrid Perovskite CH3NH3Pb(BrxI1−x)3 Crystals Synthesized via a Solvothermal Method, , , , , , , , , and 3 other author(s). Scientific Reports, 7 (1): 17695-- (2017)Virtual auditing agents: the EDGAR Agent challenge., , , , and . Decis. Support Syst., 28 (3): 241-253 (2000)Off-state breakdown and leakage current transport analysis of AlGaN/GaN high electron mobility transistors., , , , , , , , and . Microelectron. Reliab., 54 (11): 2406-2409 (2014)Full key dependent coverless test disguise method by interval-extension-based double authentications., and . Multim. Tools Appl., 79 (19-20): 13667-13691 (2020)Cognitive Cellular Content Delivery Networks: Cross-Layer Design and Analysis., , , and . VTC Spring, page 1-6. IEEE, (2016)A Novel Energy-Efficient Approach for Human Activity Recognition., , , , , , , , and . Sensors, 17 (9): 2064 (2017)SpineRegNet: Spine Registration Network for volumetric MR and CT image by the joint estimation of an affine-elastic deformation field., , , , , , , , and . Medical Image Anal., (May 2023)Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing., , , , , and . IEEE Internet Things J., 11 (2): 1893-1909 (January 2024)Assessing impacts of data volume and data set balance in using deep learning approach to human activity recognition., , , , , , , , , and . BIBM, page 1160-1165. IEEE Computer Society, (2017)