A survey on blocking technology of entity resolution BH Li, Y Liu, AM Zhang, WH Wang, S Wan Journal of Computer Science and Technology 35, 769-793, 2020 | 103 | 2020 |
Blockchain-based trust management model for location privacy preserving in VANET B Li, R Liang, D Zhu, W Chen, Q Lin IEEE Transactions on Intelligent Transportation Systems 22 (6), 3765-3775, 2020 | 90 | 2020 |
LBS meets blockchain: an efficient method with security preserving trust in SAGIN B Li, R Liang, W Zhou, H Yin, H Gao, K Cai IEEE Internet of Things Journal 9 (8), 5932-5942, 2021 | 85 | 2021 |
Knowledge enhancement for contrastive multi-behavior recommendation H Xuan, Y Liu, B Li, H Yin Proceedings of the sixteenth ACM international conference on web search and …, 2023 | 39 | 2023 |
A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography. Y Liu, X Qin, C Wang, B Li J. Comput. 8 (11), 2880-2887, 2013 | 29 | 2013 |
A new speculative execution algorithm based on C4. 5 decision tree for Hadoop Y Li, Q Yang, S Lai, B Li Intelligent Computation in Big Data Era: International Conference of Young …, 2015 | 25 | 2015 |
A knowledge-aware recommender with attention-enhanced dynamic convolutional network Y Liu, B Li, Y Zang, A Li, H Yin Proceedings of the 30th ACM international conference on information …, 2021 | 21 | 2021 |
Probabilistic Threshold k-ANN Query Method Based on Uncertain Voronoi Diagram in Internet of Vehicles S Li, B Li, J Yu, L Zhang, A Zhang, K Cai IEEE transactions on intelligent transportation systems 22 (6), 3592-3602, 2020 | 20 | 2020 |
MII: A novel text classification model combining deep active learning with BERT A Zhang, B Li, W Wang, S Wan, W Chen Comput. Mater. Contin 63, 1499-1514, 2020 | 20 | 2020 |
The OL-DAWE model: tweet polarity sentiment analysis with data augmentation W Wang, B Li, D Feng, A Zhang, S Wan IEEE Access 8, 40118-40128, 2020 | 17 | 2020 |
A survey of relation extraction of knowledge graphs A Li, X Wang, W Wang, A Zhang, B Li Web and Big Data: APWeb-WAIM 2019 International Workshops, KGMA and DSEA …, 2019 | 16 | 2019 |
Structured sentiment analysis A Almars, X Li, X Zhao, IA Ibrahim, W Yuan, B Li Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017 | 16 | 2017 |
A detection mechanism on malicious nodes in IoT B Li, R Ye, G Gu, R Liang, W Liu, K Cai Computer Communications 151, 51-59, 2020 | 15 | 2020 |
Learning fine-grained patient similarity with dynamic bayesian network embedded RNNs Y Wang, W Chen, B Li, R Boots Database Systems for Advanced Applications: 24th International Conference …, 2019 | 15 | 2019 |
GISDCN: a graph-based interpolation sequential recommender with deformable convolutional network Y Zang, Y Liu, W Chen, B Li, A Li, L Yue, W Ma International Conference on Database Systems for Advanced Applications, 289-297, 2022 | 12 | 2022 |
DAMTRNN: a delta attention-based multi-task RNN for intention recognition W Chen, L Yue, B Li, C Wang, QZ Sheng International Conference on Advanced Data Mining and Applications, 373-388, 2019 | 12 | 2019 |
Cyberbullying detection with birnn and attention mechanism A Zhang, B Li, S Wan, K Wang International Conference on Machine Learning and Intelligent Communications …, 2019 | 12 | 2019 |
CSIP: enhanced link prediction with context of social influence propagation H Gao, B Li, W Xie, Y Zhang, D Guan, W Chen, K Cai Big Data Research 24, 100217, 2021 | 11 | 2021 |
A forward-secure grouping-proof protocol for multiple RFID tags L Ya-li, Q Xiao-lin, L Bo-han, L Liang International Journal of Computational Intelligence Systems 5 (5), 824-833, 2012 | 10 | 2012 |
A trust management-based route planning scheme in LBS network X Song, B Li, T Dai, J Tian International Conference on Advanced Data Mining and Applications, 307-322, 2022 | 9 | 2022 |