Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Fuzzy Control Methods for Suspension Density and Liquid Levels in Dense-Medium Separation.. ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 35-42. Springer, (2009)An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 215-228. Springer, (2016)A Chinese question answering system based on web search., , , , and . ICMLC, page 816-820. IEEE, (2014)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . CoRR, (2018)Task-specific Word Identification from Short Texts Using a Convolutional Neural Network., , and . CoRR, (2017)Secure independent-update concise-expression access control for video on demand in cloud., , , , , , and . Inf. Sci., (2017)Additive Spanners for Circle Graphs and Polygonal Graphs., , , and . WG, volume 5344 of Lecture Notes in Computer Science, page 110-121. (2008)Speech Enhancement via Generative Adversarial LSTM Networks., and . IWAENC, page 46-50. IEEE, (2018)Predicting prognostic markers for glioma using gene co-expression network analysis., , and . BCB, page 546-551. ACM, (2010)Twitter spam detection based on deep learning., , , and . ACSW, page 3:1-3:8. ACM, (2017)