92 results on '"Sun, Guozi"'
Search Results
52. Fine-grained emoji sentiment analysis based on attributes of Twitter users
53. Characterization and graph embedding of weighted social networks through Diffusion Wavelets
54. Sentiment Analysis Based on Bi-LSTM Using Tone
55. JEDoDF: Judicial Event Discrimination Based on Deep Forest
56. CRQA: Credibility Retrieval for Medical Question Answer Service
57. Chinese Spam Data Filter Model in Mobile Internet
58. Sharing of encrypted lock keys in the blockchain-based renting house system from time- and identity-based proxy reencryption
59. Emotion Recognition using Sequence Mining
60. Overdue Prediction of Bank Loans Based on Deep Neural Network
61. The Dynamic Data Integrity Verification and Recovery Scheme based on MHT
62. DDoS Attacks and Flash Event Detection Based on Flow Characteristics in SDN
63. Web attack forensics based on network traffic behavior characteristics and URLs
64. Overdue Prediction of Bank Loans Based on LSTM-SVM
65. Network Traffic Anomaly Detection Based on Wavelet Analysis
66. P2P Lending Platform Risk Observing Method Based on Short-Time Multi-Source Regression Algorithm
67. Stock Prediction based on Bayesian-LSTM
68. A Forensics Model of Mobile Phone Based on Mining Social Relations
69. DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network
70. A Password Authentication and Update Scheme Based on Elliptic Curve Cryptography
71. SRRTC: Social Recommendation Based on Relationship Transmission with Convergence Algorithm
72. An optimized approach for massive web page classification using entity similarity based on semantic network
73. Cybersecurity for Cyber-Enabled Multimedia Applications
74. A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews
75. Stock Prediction based on Bayesian-LSTM.
76. A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics
77. LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code
78. Recovery of Deleted Record for SQLite3 Database
79. A security carving approach for AVI video based on frame size and index
80. DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network
81. AppTrace: Dynamic trace on Android devices
82. Dump and analysis of Android volatile memory on Wechat
83. Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis
84. A security carving approach for AVI video based on frame size and index.
85. Defending Against Jamming Attacks in Wireless Local Area Networks
86. A method to identify the AVI-type blocks based on their four-character codes and C4.5 algorithm
87. An Information Classification Approach Based on Knowledge Network
88. An Approach for Intention Perception Based on Knowledge Network
89. A privacy protection policy combined with privacy homomorphism in the Internet of Things
90. A new definition of homomorphic signature for identity management in mobile cloud computing
91. Data Deduplication in Wireless Multimedia Monitoring Network
92. MapReduce-based frequent itemset mining for analysis of electronic evidence
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.