Author of the publication

Incorporating Pre-trained Transformer Models into TextCNN for Sentiment Analysis on Software Engineering Texts.

, , , , , , , , and . Internetware, page 127-136. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macro Action Selection with Deep Reinforcement Learning in StarCraft., , , , , and . AIIDE, page 94-99. AAAI Press, (2019)Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection., , , , and . SCAM, page 143-150. IEEE, (2023)TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts., , , , , , , and . ICSE, page 216:1-216:13. ACM, (2024)Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation., , , , , , , , , and 1 other author(s). IEEE Trans. Software Eng., 50 (7): 1658-1674 (July 2024)Automated Data-Processing Function Identification Using Deep Neural Network., , , , and . IEEE Access, (2020)Exploiting the Unique Expression for Improved Sentiment Analysis in Software Engineering Text., , , , , , and . ICPC, page 149-159. IEEE, (2021)Semi-supervised pre-processing for learning-based traceability framework on real-world software projects., , , , and . ESEC/SIGSOFT FSE, page 570-582. ACM, (2022)RL-Based CEP Operator Placement Method on Edge Networks Using Response Time Feedback., , , , , and . WISA, volume 14094 of Lecture Notes in Computer Science, page 559-571. Springer, (2023)Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection., , , , , and . CoRR, (2024)Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery., , , , , , , , and . ASE, page 114:1. ACM, (2022)