关注
Xiaqing Xie
Xiaqing Xie
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
W He, X Wu, J Wu, X Xie, L Qiu, L Sun
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021
52021
Hot event detection for social media based on keyword semantic information
Z Yu, X Wu, X Xie, J Xu
2019 IEEE fourth international conference on data science in cyberspace (DSC …, 2019
42019
Efficient identity-based offline/online encryption scheme for lightweight devices
J Xu, X Wu, X Xie
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
42018
Study and application of semantic-based image retrieval
XXIEQBAILHOU Xu WU
The Journal of China Universities of Posts and Telecommunications 20 …, 2013
42013
An implementation of trusted remote attestation oriented the iaascloud
C Li, X Wu, C Liu, X Xie
Trustworthy Computing and Services: International Conference, ISCTCS 2012 …, 2013
42013
Sensitive image information recognition model of network community based on content text
L Gao, X Wu, J Wu, X Xie, L Qiu, L Sun
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021
32021
Chinese open relation extraction with pointer-generator networks
Z Cheng, X Wu, X Xie, J Wu
2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC …, 2020
32020
Short text topic recognition and optimization method for university online community
X Wu, H Wu, X Xie, J Xu, T Zhang
Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019
32019
Study of test classification algorithm based on domain knowledge
Y Gao, F Song, X Xie, Q Sun, X Wu
IET Digital Library, 2015
32015
面向机构知识库结构化数据的文本相似度评价算法
吴旭, 郭芳毓, 颉夏青, 许晋
信息网络安全, 16-20, 2015
32015
Construction and implementation of ‘classic reading’innovation platform
WU Xu, XU Jin, X XIE, X GAO
The Journal of China Universities of Posts and Telecommunications 20, 128-135, 2013
32013
A universal neuronal classification and naming scheme based on the neuronal morphology
L Chunwen, X Xiaqing, W Xu
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
32011
A method of document sensitivity calculation based on semantic dependency analysis
L Gang, W Xu, X Xia-qing
2019 IEEE 8th Joint International Information Technology and Artificial …, 2019
22019
An improved multi-classification algorithm for imbalanced online public opinion data
X Dang, X Wu, X Xie, T Zhang
Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019
22019
The design and implementation of APK eBooks online generation system based on FBReader
X Wu, J Shi, X Xie
Trustworthy Computing and Services: International Conference, ISCTCS 2014 …, 2015
22015
Research and implementation of a role-based trustworthiness mechanism for IaaS
X Wu, X Xie, C Li
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
22012
DSANE: A Dual Structure-Aware Network Embedding Approach for User Identity Linkage
Z Xiong, X Xie, X Wu, Y Peng, Y Lu
2023 IEEE 8th International Conference on Big Data Analytics (ICBDA), 193-198, 2023
12023
Adversarial Residual Variational Graph Autoencoder with Batch Normalization
Q Liao, X Wu, X Xie, J Wu, L Qiu, L Sun
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021
12021
A topic mining method for multi-source network public opinion based on improved hierarchical clustering
Y Cai, X Wu, X Xie, J Xu
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019
12019
Hybrid text topic discovery method for multi-source information
X Wang, X Wu, X Xie, J Xu
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20