Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Crowdturfing Detection in Online Review System: A Graph-Based Modeling

    With the widespread popularity of online reviews and crowdsourcing, people may publish fake comments on online review system and get paid for crowdsourcing tasks. In order to identify these reviewers, machine ...

    Qilong Feng, Yue Zhang, Li Kuang in Collaborative Computing: Networking, Appli… (2021)

  2. No Access

    Chapter and Conference Paper

    Domain Adaptive Neural Sentence Compression by Tree Cutting

    Sentence compression has traditionally been tackled as syntactic tree pruning, where rules and statistical features are defined for pruning less relevant words. Recent years have witnessed the rise of neural m...

    Litton J. Kurisinkel, Yue Zhang, Vasudeva Varma in Advances in Information Retrieval (2019)

  3. No Access

    Chapter and Conference Paper

    Overview of the NLPCC 2019 Shared Task: Cross-Domain Dependency Parsing

    This paper presents an overview of the NLPCC 2019 shared task on cross-domain dependency parsing, including (1) the data annotation process, (2) task settings, (3) methods, results, and analysis of submitted ...

    Xue Peng, Zhenghua Li, Min Zhang, Rui Wang in Natural Language Processing and Chinese Co… (2019)

  4. No Access

    Chapter and Conference Paper

    Shared-Private LSTM for Multi-domain Text Classification

    Shared-private models can significantly improve the performance of cross-domain learning. These methods use a shared encoder for all domains and a private encoder for each domain. One issue is that domain-spec...

    Haiming Wu, Yue Zhang, ** **, Yun Xue in Natural Language Processing and Chinese Co… (2019)

  5. No Access

    Chapter and Conference Paper

    Fuzzy Maximal Frequent Itemset Mining Over Quantitative Databases

    Fuzzy frequent itemset mining is an important problem in quantitative data mining. In this paper, we define the problem of fuzzy maximal frequent itemset mining, which, to the best of our knowledge, has never ...

    Haifeng Li, Yue Wang, Ning Zhang in Intelligent Information and Database Syste… (2017)

  6. No Access

    Chapter and Conference Paper

    Sketch-Based Image Retrieval with a Novel BoVW Representation

    A novel Bag-of-Visual-Word (BoVW) based approach is developed in this paper to facilitate more effective Sketch-based Image Retrieval (SBIR). We focus on constructing the visual vocabulary based on the BoVW re...

    Cheng **, Chenjie Li, Zheming Wang, Yuejie Zhang, Tao Zhang in MultiMedia Modeling (2016)

  7. No Access

    Chapter and Conference Paper

    Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency

    Secure scalar product protocol has wide applications for privacy-preservation in collaborative computation. In this paper, we propose a new secure scalar product protocol, which does not employ any public-key ...

    Youwen Zhu, Zhikuan Wang, Bilal Hassan in Collaborative Computing: Networking, Appli… (2016)

  8. No Access

    Chapter and Conference Paper

    Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner

    Recently, many schemes have been proposed to support k-nearest neighbors (k-NN) query on encrypted cloud data. However, existing approaches either assume query users are fully-trusted, or require data owner to be...

    Youwen Zhu, Zhikuan Wang, Yue Zhang in Advances in Knowledge Discovery and Data Mining (2016)

  9. No Access

    Chapter and Conference Paper

    Threshold Determination and Engaging Materials Scientists in Ontology Design

    This paper reports on research exploring a threshold for engaging scientists in semantic ontology development. The domain application, nanocrystalline metals, was pursued using a multi-method approach involving a...

    Jane Greenberg, Yue Zhang, Adrian Ogletree in Metadata and Semantics Research (2015)

  10. No Access

    Chapter and Conference Paper

    A Semantics Oriented Grammar for Chinese Treebanking

    Chinese grammar engineering has been a much debated task. Whilst semantic information has been reconed crucial for Chinese syntactic analysis and downstream applications, existing Chinese treebanks lack a cons...

    Meishan Zhang, Yue Zhang, Wanxiang Che in Computational Linguistics and Intelligent … (2014)

  11. No Access

    Chapter and Conference Paper

    Caption Detection and Positioning in Digital Video

    Captions in digital video are of great importance for video semantic understanding. In order to realize the function of caption detection and positioning, this paper first selects the frames that contain capti...

    Zhujun Wang, Shanzhen Lan, Lei Yang, Yue Zhang in Foundations of Intelligent Systems (2014)

  12. No Access

    Chapter and Conference Paper

    CIE: Learner Behavior Modeling Oriented Component Model for Edutainment Game

    Edutainment games with the feature of learner behavior modeling may differ from many aspects, which made it crucial to define all related information according to a unified model. In this paper, we proposed a ...

    Yue Zhang, Zhiqiang Dai, Fang Miao in Proceedings of the 2012 International Conf… (2013)

  13. No Access

    Chapter and Conference Paper

    An e-Learning System for Piano Instruction

    This paper exhibits an e-learning system that combines hardware and software in order to build a platform for piano instruction. Firstly, we set the e-learning system in contrast with traditional teaching. The...

    Ruiheng Sun, Ningsheng Ma, Yuening Zhang in Engaging Learners Through Emerging Technol… (2012)

  14. No Access

    Chapter and Conference Paper

    A Secure Mix Network with an Efficient Validity Verification Mechanism

    A new mix network scheme is proposed in this paper. It adopts the so-called general verification mechanism to improve efficiency of validity verification and avoids the drawbacks of the existing general verifi...

    Kun Peng, Yuexin Zhang in Internet and Distributed Computing Systems (2012)

  15. No Access

    Chapter and Conference Paper

    Certificate-Based Key-Insulated Signature

    To reduce the influence of key exposure, we introduce key-insulated into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We t...

    Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang in Data and Knowledge Engineering (2012)

  16. No Access

    Chapter and Conference Paper

    Composition and Extended Method of Information Grid

    This content provides an overarching introduction to the field of information grid (IG). It examines the emerging context and rationale for IG, the implications and benefits of IG for compositions, and the cur...

    Li Hao, ZhongShan Yang, YueHong Zhang in Advances in Computer Science, Environment,… (2011)

  17. No Access

    Chapter and Conference Paper

    Research on Lesk-C-Based WSD and Its Application in English-Chinese Bi-directional CLIR

    Cross-Language Information Retrieval (CLIR) combines the traditional Information Retrieval technique and Machine Translation technique. There are many aspects related to the problem of polysemy, which are good...

    Yuejie Zhang, Tao Zhang in Information Retrieval Technology (2009)

  18. Chapter and Conference Paper

    The LLAMA Middleware Support for Accountable Service-Oriented Architecture

    Enterprises are turning to SOA for the flexible deployment of business processes. While current monitoring tools can detect service execution problems in an enterprise’s servers and report such problems to hum...

    Mark Panahi, Kwei-Jay Lin, Yue Zhang in Service-Oriented Computing – ICSOC 2008 (2008)