Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Approach for Identifying Author Profiles of Blogs

    Author profile identification has been an important research problem in the areas of web mining, network public opinion monitoring and social network analysis. The aim of this problem is to identify characteri...

    Chunxia Zhang, Yu Guo, Jiayu Wu, Shuliang Wang in Advanced Data Mining and Applications (2017)

  2. No Access

    Chapter and Conference Paper

    Authorship Identification of Source Codes

    Source code authorship identification is an issue of authorship identification from documents, and it is to identify authors of source codes or programs based on source code examples of programmers. The main a...

    Chunxia Zhang, Sen Wang, Jiayu Wu, Zhendong Niu in Web and Big Data (2017)

  3. No Access

    Chapter and Conference Paper

    Identifying Helpful Online Reviews with Word Embedding Features

    The advent of Web 2.0 has enabled users to share their opinions via various social media websites. People’s decision-making process is strongly influenced by online reviews. Predicting the helpfulness of revie...

    Jie Chen, Chunxia Zhang, Zhendong Niu in Knowledge Science, Engineering and Management (2016)

  4. No Access

    Chapter and Conference Paper

    A Supervised Parameter Estimation Method of LDA

    Latent Dirichlet Allocation (LDA) probabilistic topic model is a very effective dimension-reduction tool which can automatically extract latent topics and dedicate to text representation in a lower-dimensional...

    Liu Zhenyan, Meng Dan, Wang Wei**, Zhang Chunxia in Web Technologies and Applications (2015)

  5. No Access

    Chapter and Conference Paper

    Design of an Improved Method of Rijndael S-Box

    According to the design criterion of S-box in Rijndael algorithm, a number of S-boxes with good cryptographic properties were constructed, and the avalanche probabilities of these S-boxes were analyzed from va...

    Chunxia Tu in Innovative Computing and Information (2011)

  6. No Access

    Chapter and Conference Paper

    Research on Security of VoIP Network

    As a voice transmission technology based on packet switching, VoIP is quite different from traditional telephone service which is based on circuit switching, which results in specific security issues on VoIP n...

    **aojun Liu, Chunxia Tu in Innovative Computing and Information (2011)

  7. No Access

    Chapter and Conference Paper

    Interactive Visual Object Extraction Based on Belief Propagation

    Interactive foreground/background segmentation in a static image is a hot topic in image processing. Classical frameworks focus on providing one class label for the user to specify the foreground. This may be ...

    Shiming **ang, Fei** Nie, Changshui Zhang in Advances in Multimedia Modeling (2006)