팔로우
Lu Zhang
Lu Zhang
Nanjing Audit University
seu.edu.cn의 이메일 확인됨
제목
인용
인용
연도
hPSD: a hybrid PU-learning-based spammer detection model for product reviews
Z Wu, J Cao, Y Wang, Y Wang, L Zhang, J Wu
IEEE transactions on cybernetics 50 (4), 1595-1606, 2018
1692018
Personalized itinerary recommendation: Deep and collaborative learning with textual information
L Chen, L Zhang, S Cao, Z Wu, J Cao
Expert Systems with Applications 144, 113070, 2020
692020
Detecting spammer groups from product reviews: a partially supervised learning model
L Zhang, Z Wu, J Cao
IEEE access 6, 2559-2568, 2017
612017
Spammers detection from product reviews: a hybrid model
Z Wu, Y Wang, Y Wang, J Wu, J Cao, L Zhang
2015 IEEE International Conference on Data Mining, 1039-1044, 2015
532015
Efficiently translating complex SQL query to mapreduce jobflow on cloud
Z Wu, A Song, J Cao, J Luo, L Zhang
IEEE transactions on cloud computing 8 (2), 508-517, 2017
492017
Game theory based emotional evolution analysis for chinese online reviews
Z Bu, H Li, J Cao, Z Wu, L Zhang
Knowledge-Based Systems 103, 60-72, 2016
422016
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans
W Hu, L Zhang, A Ardeshiricham, J Blackstone, B Hou, Y Tai, R Kastner
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 707-713, 2017
352017
Online identification of Tor anonymous communication traffic
何高峰, 杨明, 罗军舟, 张璐
Journal of Software 24 (3), 540-556, 2013
342013
A pattern-based topic detection and analysis system on Chinese tweets
L Zhang, Z Wu, Z Bu, Y Jiang, J Cao
Journal of computational science 28, 369-381, 2018
312018
Electrical fault diagnosis from text data: A supervised sentence embedding combined with imbalanced classification
X Jing, Z Wu, L Zhang, Z Li, D Mu
IEEE Transactions on Industrial Electronics 71 (3), 3064-3073, 2023
292023
A comparative study on shilling detection methods for trustworthy recommendations
Y Wang, L Qian, F Li, L Zhang
Journal of Systems Science and Systems Engineering 27, 458-478, 2018
232018
Application-level attack against Tor's hidden service
L Zhang, J Luo, M Yang, G He
2011 6th International Conference on Pervasive Computing and Applications …, 2011
222011
Examining the consequences of high-level synthesis optimizations on power side-channel
L Zhang, W Hu, A Ardeshiricham, Y Tai, J Blackstone, D Mu, R Kastner
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
182018
Performance analysis of BBR congestion control protocol based on NS3
H Zhang, H Zhu, Y Xia, L Zhang, Y Zhang, Y Deng
2019 Seventh International Conference on Advanced Cloud and Big Data (CBD …, 2019
172019
A comparative study of shilling attack detectors for recommender systems
Y Wang, L Zhang, H Tao, Z Wu, J Cao
2015 12th International Conference on Service Systems and Service Management …, 2015
172015
Memory-based high-level synthesis optimizations security exploration on the power side-channel
L Zhang, D Mu, W Hu, Y Tai, J Blackstone, R Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
162019
Spotting review spammer groups: a cosine pattern and network based method
L Zhang, G He, J Cao, H Zhu, B Xu
Concurrency and Computation: Practice and Experience 30 (20), e4686, 2018
152018
Tor 匿名通信流量在线识别方法
何高峰, 杨明, 罗军舟, 张璐
软件学报 24 (3), 540-556, 2013
152013
An improved DSSS-based flow marking technique for anonymous communication traceback
L Zhang, J Luo, M Yang
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
142009
基于时隙质心流水印的匿名通信追踪技术
张璐, 罗军舟, 杨明, 何高峰
软件学报 22 (10), 2358-2371, 2011
132011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20