A survey on blocking technology of entity resolution BH Li, Y Liu, AM Zhang, WH Wang, S Wan Journal of Computer Science and Technology 35, 769-793, 2020 | 118 | 2020 |
Blockchain-based trust management model for location privacy preserving in VANET B Li, R Liang, D Zhu, W Chen, Q Lin IEEE Transactions on Intelligent Transportation Systems 22 (6), 3765-3775, 2020 | 116 | 2020 |
LBS meets blockchain: an efficient method with security preserving trust in SAGIN B Li, R Liang, W Zhou, H Yin, H Gao, K Cai IEEE Internet of Things Journal 9 (8), 5932-5942, 2021 | 88 | 2021 |
Knowledge enhancement for contrastive multi-behavior recommendation H Xuan, Y Liu, B Li, H Yin Proceedings of the sixteenth ACM international conference on web search and …, 2023 | 81 | 2023 |
A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography. Y Liu, X Qin, C Wang, B Li J. Comput. 8 (11), 2880-2887, 2013 | 28 | 2013 |
A new speculative execution algorithm based on C4. 5 decision tree for Hadoop Y Li, Q Yang, S Lai, B Li International conference of young computer scientists, engineers and …, 2015 | 25 | 2015 |
MII: A Novel Text Classification Model Combining Deep Active Learning with BERT. A Zhang, B Li, W Wang, S Wan, W Chen Computers, Materials & Continua 63 (3), 2020 | 24 | 2020 |
A knowledge-aware recommender with attention-enhanced dynamic convolutional network Y Liu, B Li, Y Zang, A Li, H Yin Proceedings of the 30th ACM international conference on information …, 2021 | 22 | 2021 |
Probabilistic Threshold k-ANN Query Method Based on Uncertain Voronoi Diagram in Internet of Vehicles S Li, B Li, J Yu, L Zhang, A Zhang, K Cai IEEE transactions on intelligent transportation systems 22 (6), 3592-3602, 2020 | 22 | 2020 |
A survey of relation extraction of knowledge graphs A Li, X Wang, W Wang, A Zhang, B Li Web and Big Data: APWeb-WAIM 2019 International Workshops, KGMA and DSEA …, 2019 | 22 | 2019 |
The OL-DAWE model: tweet polarity sentiment analysis with data augmentation W Wang, B Li, D Feng, A Zhang, S Wan IEEE Access 8, 40118-40128, 2020 | 19 | 2020 |
A detection mechanism on malicious nodes in IoT B Li, R Ye, G Gu, R Liang, W Liu, K Cai Computer Communications 151, 51-59, 2020 | 17 | 2020 |
Structured sentiment analysis A Almars, X Li, X Zhao, IA Ibrahim, W Yuan, B Li Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017 | 17 | 2017 |
Self-supervised dynamic hypergraph recommendation based on hyper-relational knowledge graph Y Liu, H Xuan, B Li, M Wang, T Chen, H Yin Proceedings of the 32nd ACM International Conference on Information and …, 2023 | 16 | 2023 |
Learning fine-grained patient similarity with dynamic bayesian network embedded RNNs Y Wang, W Chen, B Li, R Boots Database Systems for Advanced Applications: 24th International Conference …, 2019 | 16 | 2019 |
CSIP: enhanced link prediction with context of social influence propagation H Gao, B Li, W Xie, Y Zhang, D Guan, W Chen, K Cai Big Data Research 24, 100217, 2021 | 14 | 2021 |
Cyberbullying detection with birnn and attention mechanism A Zhang, B Li, S Wan, K Wang International Conference on Machine Learning and Intelligent Communications …, 2019 | 14 | 2019 |
GISDCN: a graph-based interpolation sequential recommender with deformable convolutional network Y Zang, Y Liu, W Chen, B Li, A Li, L Yue, W Ma International Conference on Database Systems for Advanced Applications, 289-297, 2022 | 13 | 2022 |
DAMTRNN: a delta attention-based multi-task RNN for intention recognition W Chen, L Yue, B Li, C Wang, QZ Sheng International Conference on Advanced Data Mining and Applications, 373-388, 2019 | 13 | 2019 |
T-PORP: a trusted parallel route planning model on dynamic road networks B Li, T Dai, W Chen, X Song, Y Zang, Z Huang, Q Lin, K Cai IEEE Transactions on Intelligent Transportation Systems 24 (1), 1238-1250, 2022 | 12 | 2022 |