Author of the publication

Text Classification of Network Pyramid Scheme based on Topic Model.

, , and . NLPIR, page 15-19. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Disclosure in the Real World: An Experimental Study., , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-22 (2022)A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network., , and . TrustCom/BigDataSE, page 1702-1705. IEEE, (2018)Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion., , , and . COMPSAC, page 255-261. IEEE, (2020)Bitcoin transaction pattern recognition based on semi-supervised learning., , , and . J. Comput. Sci., (2023)Pyramid Text Recognition Based on A New Text Representation Model., , and . ICNSC, page 195-199. IEEE, (2019)An adaptive semi-supervised deep learning-based framework for the detection of Android malware., , , , , , , and . J. Intell. Fuzzy Syst., 45 (3): 5141-5157 (2023)Text Classification of Network Pyramid Scheme based on Topic Model., , and . NLPIR, page 15-19. ACM, (2019)An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks., , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (3): 4367-4384 (June 2024)Mobile beacon-based adaptive time synchronization for wireless sensor networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2018)A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks., , , , , , , and . IEEE Access, (2021)