[1] |
YANG Qian, GU Lei.
Chinese Named Entity Recognition Based on Denoising Joint Character-Word Model
[J]. Computer Engineering and Applications, 2021, 57(7): 151-157.
|
[2] |
CHENG Yuhang, ZHANG Jianqin, LI Jiangchuan, ZHANG An.
Visual Mining and Analysis Method of Text Data in Traffic Accident
[J]. Computer Engineering and Applications, 2021, 57(21): 116-122.
|
[3] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[4] |
MENG Xiangfu, WANG Dandan, ZHANG Feng.
Overview of Spatial Keyword Queries
[J]. Computer Engineering and Applications, 2021, 57(20): 13-24.
|
[5] |
LI Hao, NING Haoyu, KANG Yan, LIANG Wentao, HUO Wen.
SMRFGAN Model for Text Emotion Transfer
[J]. Computer Engineering and Applications, 2021, 57(2): 170-176.
|
[6] |
YAO Guibin, ZHANG Qigui.
Chinese Named Entity Recognition Based on XLnet Language Model
[J]. Computer Engineering and Applications, 2021, 57(18): 156-162.
|
[7] |
SHEN Yanguang, JIA Yaoqing.
Text Categorization Method Based on Word Co-occurrence and Graph Convolution
[J]. Computer Engineering and Applications, 2021, 57(11): 173-178.
|
[8] |
CAO Junbo,YE Xia,XU Feixiang,YIN Liedong.
Improved CBOW Emotional Information Acquisition Research
[J]. Computer Engineering and Applications, 2020, 56(9): 142-147.
|
[9] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[10] |
LI Xinye, ZHU Jing, MA Lina.
Survey of Scene Recognition Methods Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(5): 25-33.
|
[11] |
FAN Wei, LIU Huan, ZHANG Yuxiang.
Keyphrase Extraction Algorithm Integrating Word Embeddings and Position Information
[J]. Computer Engineering and Applications, 2020, 56(5): 179-185.
|
[12] |
XU Ge, YANG Xiaoyan, WANG Tao.
Survey on Semantic Similarity Calculation of Words
[J]. Computer Engineering and Applications, 2020, 56(4): 9-15.
|
[13] |
ZHOU Kang, WAN Liang, DING Hongwei.
Detection of Malicious Domain Names Based on AN and LSTM
[J]. Computer Engineering and Applications, 2020, 56(4): 92-98.
|
[14] |
LI Donghao, YANG Wenzhong, ZHONG Lijun, ZHANG Zhihao, WANG Xueying.
Bursty Event Detection Method Based on Key Microblog
[J]. Computer Engineering and Applications, 2020, 56(4): 175-183.
|
[15] |
ZHENG Dequan, YU Feng, WANG Hewei.
Text Entailment Recognition Based on Integration of Language Knowledge and Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(24): 157-163.
|