Skip to main content

Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Detecting Spam Community Using Retweeting Relationships – A Study on Sina Microblog

    Microblog marketing is a new trend in social media. Spammers have been increasingly targeting such platforms to disseminate spam and promoting messages. Unlike the past behaviors on traditional media, they con...

    Bin Zhao, Genlin Ji, Weiguang Qu, Zhigang Zhang in Behavior and Social Computing (2013)

  2. No Access

    Chapter and Conference Paper

    BC-BSP: A BSP-Based Parallel Iterative Processing System for Big Data on Cloud Architecture

    Many applications in real life can produce and collect large amount of data and many of them can be modeled by Graph. The number of vertexes of a graph could be several hundreds of millions to billions and the...

    Yubin Bao, Zhigang Wang, Yu Gu, Ge Yu in Database Systems for Advanced Applications (2013)

  3. No Access

    Chapter and Conference Paper

    Pricing in Social Networks with Negative Externalities

    We study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. We assume impatient consumers who buy the pro...

    Zhigang Cao, Xu** Chen, **aodong Hu, Changjun Wang in Computational Social Networks (2015)

  4. No Access

    Chapter and Conference Paper

    Domain Specific Cross-Lingual Knowledge Linking Based on Similarity Flooding

    The global knowledge sharing makes large-scale multi-lingual knowledge bases an extremely valuable resource in the Big Data era. However, current mainstream multi-lingual ontologies based on online wikis still...

    Liangming Pan, Zhigang Wang, Juanzi Li in Knowledge Science, Engineering and Managem… (2016)

  5. No Access

    Chapter and Conference Paper

    Spectrum Allocation Based on Gaussian - Cauchy Mutation Shuffled Frog Lea** Algorithm

    When solving the cognitive radio spectrum allocation problems, the traditional Shuffled Frog Lea** Algorithm (SFLA) will be trapped into the local optimal solution easily and search lack of population divers...

    Zhe Qin, Jiaqi Liu, Zhigang Chen, Lin Guo, Ling Huang in Advances in Services Computing (2016)

  6. No Access

    Chapter and Conference Paper

    Secured Privacy Preserving Data Aggregation with Semi-honest Servers

    With the large deployment of smart devices, the collections and analysis of user data significantly benefit both industry and people’s daily life. However, it has showed a serious risk to people’s privacy in t...

    Zhigang Lu, Hong Shen in Advances in Knowledge Discovery and Data Mining (2017)

  7. No Access

    Chapter and Conference Paper

    DT-KST: Distributed Top-k Similarity Query on Big Trajectory Streams

    During the past decade, with the widespread use of smartphones and other mobile devices, big trajectory data are generated and stored in a distributed way. In this work, we focus on the distributed top-k similari...

    Zhigang Zhang, Yilin Wang, Jiali Mao in Database Systems for Advanced Applications (2017)

  8. No Access

    Chapter and Conference Paper

    An Adaptive Data Partitioning Scheme for Accelerating Exploratory Spark SQL Queries

    For data analysis, it’s useful to explore the data set with a sequence of queries, frequently using the results from the previous queries to shape the next queries. Thus, data used in the previous queries are ...

    Chenghao Guo, Zhigang Wu, Zhenying He in Database Systems for Advanced Applications (2017)

  9. No Access

    Chapter and Conference Paper

    TrajSpark: A Scalable and Efficient In-Memory Management System for Big Trajectory Data

    The widespread application of mobile positioning devices has generated big trajectory data. Existing disk-based trajectory management systems cannot provide scalable and low latency query services any more. In...

    Zhigang Zhang, Cheqing **, Jiali Mao, **aolin Yang, Aoying Zhou in Web and Big Data (2017)

  10. No Access

    Chapter and Conference Paper

    Distant Supervision for Relation Extraction with Neural Instance Selector

    Distant supervised relation extraction is an efficient method to find novel relational facts from very large corpora without expensive manual annotation. However, distant supervision will inevitably lead to wr...

    Yubo Chen, Hongtao Liu, Chuhan Wu in Natural Language Processing and Chinese Co… (2018)

  11. No Access

    Chapter and Conference Paper

    MDTK: Bandwidth-Saving Framework for Distributed Top-k Similar Trajectory Query

    During the past decade, with the popularity of smartphones and other mobile devices, big trajectory data is generated and stored in a distributed way. In this work, we focus on the DTW distance based top-k query ...

    Zhigang Zhang, Jiali Mao, Cheqing ** in Database Systems for Advanced Applications (2018)

  12. No Access

    Chapter and Conference Paper

    Triple-Joint Modeling for Question Generation Using Cross-Task Autoencoder

    Question Generation (QG) aims to generate a question based on the context. Given the intrinsic connections between QG and QA (Question Answering), we focus on training a joint model for both QG and QA, and ta...

    Hongling Wang, Renshou Wu, Zhixu Li in Natural Language Processing and Chinese Co… (2019)

  13. No Access

    Chapter and Conference Paper

    Unsupervised Entity Alignment Using Attribute Triples and Relation Triples

    Entity alignment aims to find entities referring to the same real-world object across different knowledge graphs (KGs). Most existing works utilize the relations between entities contained in the relation trip...

    Fuzhen He, Zhixu Li, Yang Qiang, An Liu in Database Systems for Advanced Applications (2019)

  14. No Access

    Chapter and Conference Paper

    Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information

    Retweeting provides an efficient way to expand information diffusion in social networks, and many methods have been proposed to model user’s retweeting behaviors. However, most of existing works focus on devis...

    Bo Jiang, Zhigang Lu, Ning Li, Jianjun Wu in Database Systems for Advanced Applications (2019)

  15. No Access

    Chapter and Conference Paper

    Intelligent Health Care Data Management Using Blockchain: Current Limitation and Future Research Agenda

    Health care is undergoing a big data revolution, with vast amounts of information supplied from numerous sources, leading to major paradigm shifts including precision medicine and AI-driven health care among o...

    Alevtina Dubovitskaya, Petr Novotny in Heterogeneous Data Management, Polystores,… (2019)

  16. No Access

    Chapter and Conference Paper

    Towards Nested and Fine-Grained Open Information Extraction

    Open Information Extraction is a crucial task in natural language processing with wide applications. Existing efforts only work on extracting simple flat triplets that are not minimized, which neglect triplets...

    Jiawei Wang, **n Zheng, Qiang Yang in Knowledge Graph and Semantic Computing: Kn… (2021)

  17. No Access

    Chapter and Conference Paper

    Multimodal Named Entity Recognition with Image Attributes and Image Knowledge

    Multimodal named entity extraction is an emerging task which uses both textual and visual information to detect named entities and identify their entity types. The existing efforts are often flawed in two aspe...

    Dawei Chen, Zhixu Li, Binbin Gu, Zhigang Chen in Database Systems for Advanced Applications (2021)

  18. No Access

    Chapter and Conference Paper

    Syntactic Enhanced Projection Network for Few-Shot Chinese Event Extraction

    Few-shot learning event extraction methods gain more and more attention due to their ability to handle new event types. Current few-shot learning studies mainly focus on English event detection, which sufferin...

    Linhui Feng, Linbo Qiao, Yi Han, Zhigang Kan in Knowledge Science, Engineering and Managem… (2021)

  19. No Access

    Chapter and Conference Paper

    Spatial Data Publication Under Local Differential Privacy

    Local differential privacy (LDP), which has been applied in Google Chrome and Apple iOS, provides strong privacy assurance to users when collecting data from users. We focus on the sensitive spatial data colle...

    Jian Zhuang, Ning Wang, Zhigang Wang in Web Information Systems and Applications (2022)

  20. No Access

    Chapter and Conference Paper

    Aligning Internal Regularity and External Influence of Multi-granularity for Temporal Knowledge Graph Embedding

    Representation learning for the Temporal Knowledge Graphs (TKGs) is an emerging topic in the knowledge reasoning community. Existing methods consider the internal and external influence at either element level...

    Tingyi Zhang, Zhixu Li, Jiaan Wang in Database Systems for Advanced Applications (2022)

Page of 3