J Wang, Z Zhang, L Feng, KY Lin, P Liu - Technological Forecasting and …, 2023 - Elsevier
Technology opportunity analysis (TOA) has been the subject of many prior studies, most of which have focused on deconstructing and restructuring the original knowledge structure in …
Y Wu, X Wang, W Zhao, X Lv - Information Sciences, 2023 - Elsevier
In community question answering, many questions have no topic labeling or the topic labeling is very diverse, which has become the biggest obstacle to building the bridge …
Nowadays, the psychological techniques used to harass, intimidate, threaten, steal information are more common due to free access to technological resources and the …
Topic modeling is a commonly used text analysis tool for discovering latent topics in a text corpus. However, while topics in a text corpus often exhibit a hierarchical structure (eg …
Factorization Machines (FMs) are effective in incorporating side information to overcome the cold-start and data sparsity problems in recommender systems. Traditional FMs adopt the …
G Chen, S Xiao, C Zhang, W Wang - Electronic Commerce Research and …, 2022 - Elsevier
Customers in the online purchase context always bear the burden of enormous reviews. In this study, we endeavor to effectively identify and select a helpful review subset from original …
Topic modeling is a crucial unsupervised machine learning technique for identifying themes within unstructured text. This study compares traditional topic modeling methods, like Latent …
LES Crespo - 2023 - doctoradoinformatica.epn.edu.ec
In the context of cybersecurity, social engineering describes a type of attack in which the attacker exploit human vulnerabilities to breach the security goals of cyberspace elements …