hPSD: a hybrid PU-learning-based spammer detection model for product reviews Z Wu, J Cao, Y Wang, Y Wang, L Zhang, J Wu IEEE transactions on cybernetics 50 (4), 1595-1606, 2018 | 163 | 2018 |
Personalized itinerary recommendation: Deep and collaborative learning with textual information L Chen, L Zhang, S Cao, Z Wu, J Cao Expert Systems with Applications 144, 113070, 2020 | 61 | 2020 |
Detecting spammer groups from product reviews: a partially supervised learning model L Zhang, Z Wu, J Cao IEEE access 6, 2559-2568, 2017 | 59 | 2017 |
Spammers detection from product reviews: a hybrid model Z Wu, Y Wang, Y Wang, J Wu, J Cao, L Zhang 2015 IEEE International Conference on Data Mining, 1039-1044, 2015 | 52 | 2015 |
Efficiently translating complex SQL query to mapreduce jobflow on cloud Z Wu, A Song, J Cao, J Luo, L Zhang IEEE transactions on cloud computing 8 (2), 508-517, 2017 | 48 | 2017 |
Game theory based emotional evolution analysis for chinese online reviews Z Bu, H Li, J Cao, Z Wu, L Zhang Knowledge-Based Systems 103, 60-72, 2016 | 40 | 2016 |
Online identification of Tor anonymous communication traffic 何高峰, 杨明, 罗军舟, 张璐 Journal of Software 24 (3), 540-556, 2013 | 34 | 2013 |
A pattern-based topic detection and analysis system on Chinese tweets L Zhang, Z Wu, Z Bu, Y Jiang, J Cao Journal of computational science 28, 369-381, 2018 | 31 | 2018 |
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans W Hu, L Zhang, A Ardeshiricham, J Blackstone, B Hou, Y Tai, R Kastner 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 707-713, 2017 | 31 | 2017 |
A comparative study on shilling detection methods for trustworthy recommendations Y Wang, L Qian, F Li, L Zhang Journal of Systems Science and Systems Engineering 27, 458-478, 2018 | 23 | 2018 |
Electrical fault diagnosis from text data: A supervised sentence embedding combined with imbalanced classification X Jing, Z Wu, L Zhang, Z Li, D Mu IEEE Transactions on Industrial Electronics 71 (3), 3064-3073, 2023 | 20 | 2023 |
Application-level attack against Tor's hidden service L Zhang, J Luo, M Yang, G He 2011 6th International Conference on Pervasive Computing and Applications …, 2011 | 20 | 2011 |
Examining the consequences of high-level synthesis optimizations on power side-channel L Zhang, W Hu, A Ardeshiricham, Y Tai, J Blackstone, D Mu, R Kastner 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018 | 17 | 2018 |
A comparative study of shilling attack detectors for recommender systems Y Wang, L Zhang, H Tao, Z Wu, J Cao 2015 12th International Conference on Service Systems and Service Management …, 2015 | 17 | 2015 |
Memory-based high-level synthesis optimizations security exploration on the power side-channel L Zhang, D Mu, W Hu, Y Tai, J Blackstone, R Kastner IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019 | 15 | 2019 |
Spotting review spammer groups: a cosine pattern and network based method L Zhang, G He, J Cao, H Zhu, B Xu Concurrency and Computation: Practice and Experience 30 (20), e4686, 2018 | 15 | 2018 |
Tor 匿名通信流量在线识别方法 何高峰, 杨明, 罗军舟, 张璐 软件学报 24 (3), 540-556, 2013 | 15 | 2013 |
Performance analysis of BBR congestion control protocol based on NS3 H Zhang, H Zhu, Y Xia, L Zhang, Y Zhang, Y Deng 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD …, 2019 | 14 | 2019 |
An improved DSSS-based flow marking technique for anonymous communication traceback L Zhang, J Luo, M Yang 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009 | 14 | 2009 |
基于时隙质心流水印的匿名通信追踪技术 张璐, 罗军舟, 杨明, 何高峰 软件学报 22 (10), 2358-2371, 2011 | 13 | 2011 |