Author of the publication

基于神经网络的用户视频评分自动获取方法 (Neural-network-based Method for Automatic Acquisition of User's Video Rating).

, , , and . 计算机科学, 42 (11): 96-100 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Petri-Net-Based Modeling Framework for Automated Negotiation Protocols in Electronic Commerce., , and . PRIMA, volume 4078 of Lecture Notes in Computer Science, page 324-336. Springer, (2005)An LSTM-Based Topic Flow Pattern Learning Algorithm and Its Application in Deceptive Review Detection., , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 553-561. Springer, (2018)基于神经网络的用户视频评分自动获取方法 (Neural-network-based Method for Automatic Acquisition of User's Video Rating)., , , and . 计算机科学, 42 (11): 96-100 (2015)MAC-AC: A Novel Distributed MAC Protocol for Accessing Channel in Vehicular Ad Hoc Networks., , , , , and . VTC Fall, page 1-5. IEEE, (2020)Research on Fake Rating Detection Algorithm Based on Deep Learning., , and . CONF-CDS, page 88:1-88:7. ACM, (2021)A Hybrid Recommendation List Aggregation Algorithm for Group Recommendation., , , , and . WI-IAT (1), page 405-408. IEEE Computer Society, (2015)An Attitude-adaptation Negotiation Strategy in Electronic Market Environments., , , , and . SNPD (3), page 125-130. IEEE Computer Society, (2007)An Ontology Framework for EC Automated Negotiation Protocol., , , and . SNPD (3), page 432-437. IEEE Computer Society, (2007)An Anti-attack Model for Centralized C2C Reputation Evaluation Agent., , , and . ICA, page 63-69. IEEE, (2016)Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks., , , , and . Appl. Intell., 48 (7): 1891 (2018)