Author of the publication

A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network.

, , , , and . J. Inf. Sci. Eng., 37 (4): 959-974 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (6): 3337-3348 (2021)One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices., , , , , , , and . IEEE Trans. Fuzzy Syst., 30 (5): 1421-1435 (2022)An Efficient Privacy-Preserving Friend Recommendation Scheme for Social Network., , , , and . IEEE Access, (2018)TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction., , , , , and . SMC, page 1217-1223. IEEE, (2023)A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors., , and . Neurocomputing, (2019)From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT., , , and . J. Sensors, (2016)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs., , , , , and . WoWMoM, page 175-184. IEEE, (2023)Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata., , and . DSC, page 534-540. IEEE Computer Society, (2017)