default search action
Yonghong Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jing Li, Dezheng Zhang, Yonghong Xie, Aziguli Wulamu, Yao Zhang:
GP-FMLNet: A feature matrix learning network enhanced by glyph and phonetic information for Chinese sentiment analysis. CAAI Trans. Intell. Technol. 9(4): 960-972 (2024) - [j22]Jing Li, Dezheng Zhang, Yonghong Xie, Aziguli Wulamu:
A multi-type semantic interaction and enhancement method for tax question understanding. Eng. Appl. Artif. Intell. 130: 107783 (2024) - 2022
- [j21]Wenhao Shu, Wenbin Qian, Yonghong Xie:
Incremental neighborhood entropy-based feature selection for mixed-type data under the variation of feature set. Appl. Intell. 52(5): 4792-4806 (2022) - 2021
- [j20]Wenbin Qian, Jintao Huang, Yinglong Wang, Yonghong Xie:
Label distribution feature selection for multi-label classification with rough set. Int. J. Approx. Reason. 128: 32-55 (2021) - [j19]Qi Jia, Dezheng Zhang, Shibing Yang, Chao Xia, Yingjie Shi, Hu Tao, Cong Xu, Xiong Luo, Yuekun Ma, Yonghong Xie:
Traditional Chinese medicine symptom normalization approach leveraging hierarchical semantic information and text matching with attention mechanism. J. Biomed. Informatics 116: 103718 (2021) - 2020
- [j18]Peng Li, Peng Chen, Yonghong Xie, Dezheng Zhang:
Bi-Modal Learning With Channel-Wise Attention for Multi-Label Image Classification. IEEE Access 8: 9965-9977 (2020) - [j17]Dezheng Zhang, Chao Xia, Cong Xu, Qi Jia, Shibing Yang, Xiong Luo, Yonghong Xie:
Improving Distantly-Supervised Named Entity Recognition for Traditional Chinese Medicine Text via a Novel Back-Labeling Approach. IEEE Access 8: 145413-145421 (2020) - [j16]Wenbin Qian, Xuandong Long, Yinglong Wang, Yonghong Xie:
Multi-label feature selection based on label distribution and feature complementarity. Appl. Soft Comput. 90: 106167 (2020) - [j15]Cong Xu, Qing Li, Dezheng Zhang, Yonghong Xie, Xisheng Li:
Deep successor feature learning for text generation. Neurocomputing 396: 495-500 (2020) - [j14]Wenhao Shu, Wenbin Qian, Yonghong Xie:
Incremental feature selection for dynamic hybrid data using neighborhood rough set. Knowl. Based Syst. 194: 105516 (2020)
2010 – 2019
- 2019
- [j13]Wenhao Shu, Wenbin Qian, Yonghong Xie:
Knowledge Acquisition Approach Based on Incremental Objects From Data With Missing Values. IEEE Access 7: 54863-54878 (2019) - [j12]Wenhao Shu, Wenbin Qian, Yonghong Xie, Zhaoping Tang:
An Efficient Uncertainty Measure-based Attribute Reduction Approach for Interval-valued Data with Missing Values. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 27(6): 931-947 (2019) - [j11]Wenhao Shu, Wenbin Qian, Yonghong Xie:
Incremental approaches for feature selection from dynamic data with the variation of multiple objects. Knowl. Based Syst. 163: 320-331 (2019) - [c20]Qi Jia, Yonghong Xie, Cong Xu, Yue Zhou, Dezheng Zhang:
Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary. ICAIS (1) 2019: 304-314 - 2018
- [j10]Peng Chen, Yonghong Xie, Pei Jin, Dezheng Zhang:
A wireless sensor data-based coal mine gas monitoring algorithm with least squares support vector machines optimized by swarm intelligence techniques. Int. J. Distributed Sens. Networks 14(5) (2018) - [c19]Yonghong Xie, Chang Yan, Dezheng Zhang:
Personalized Diagnostic Modal Discovery of Traditional Chinese Medicine Knowledge Graph. ICNC-FSKD 2018: 1096-1103 - [c18]Yonghong Xie, Shuang Ha, Zihao Song, Dezheng Zhang:
Semantic Feature Expansion Technology Based on Knowledge Map. ICNC-FSKD 2018: 1110-1114 - 2017
- [j9]Aziguli Wulamu, Yuanyu Zhang, Yonghong Xie, Dezheng Zhang, Xiong Luo, Chunmiao Li, Yao Zhang:
A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data. Sci. Program. 2017: 3610378:1-3610378:10 (2017) - [j8]Xi Guo, Yoshiharu Ishikawa, Yonghong Xie, Aziguli Wulamu:
Reverse direction-based surrounder queries for mobile recommendations. World Wide Web 20(5): 885-913 (2017) - [c17]Aziguli Wulamu, Yuanyu Zhang, Yonghong Xie, Yang Xu, Yujia Chen:
Structural technology research on symptom data of Chinese medicine. Healthcom 2017: 1-4 - 2016
- [c16]Yonghong Xie, Jingyu Liu, Dezheng Zhang, Xiong Luo:
A Novel Prediction Scheme for Hot Rolled Strip Thickness Based on Extreme Learning Machine. ICCSIP 2016: 166-172 - 2015
- [j7]Wenbin Qian, Wenhao Shu, Yonghong Xie, Bingru Yang, Jun Yang:
Feature Selection using Compact Discernibility Matrix-based Approach in Dynamic Incomplete Decision System. J. Inf. Sci. Eng. 31(2): 509-527 (2015) - [c15]Dorothy Kalui, Xi Guo, Dezheng Zhang, Yonghong Xie, Zhiyong Yang:
Personalized Privacy Aware Framework for Moving Objects in Participatory Sensing. CIT/IUCC/DASC/PICom 2015: 191-198 - [c14]Xi Guo, Yoshiharu Ishikawa, Aziguli Wulamu, Yonghong Xie:
Reverse Direction-Based Surrounder Queries. APWeb 2015: 280-291 - [c13]Yajing Fu, Xi Guo, Yonghong Xie, Dezheng Zhang, Hailing Li:
Disease Diagnosis Supported by Hierarchical Temporal Memory. UIC/ATC/ScalCom 2015: 863-870 - [c12]Aziguli Wulamu, Hailing Li, Xi Guo, Yonghong Xie, Yajing Fu:
Processing Skyline Groups on Data Streams. UIC/ATC/ScalCom 2015: 935-942 - 2014
- [j6]Jun Xu, Lei Hu, Siwei Sun, Yonghong Xie:
Cryptanalysis of countermeasures against multiple transmission attacks on NTRU. IET Commun. 8(12): 2142-2146 (2014) - [j5]Yonghong Xie, Aziguli Wulamu, Xiaojing Hu, Xiaojie Zhu:
Design and Implementation of Privacy-preserving Recommendation System Based on MASK. J. Softw. 9(10): 2607-2613 (2014) - [c11]Zhangjie Huang, Lei Hu, Jun Xu, Liqiang Peng, Yonghong Xie:
Partial Key Exposure Attacks on Takagi's Variant of RSA. ACNS 2014: 134-150 - [c10]Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie:
Further Improvement of Factoring RSA Moduli with Implicit Hint. AFRICACRYPT 2014: 165-177 - [c9]Yuekun Ma, Dezheng Zhang, Aziguli Wulamu, Yonghong Xie, Honglei Zang, Jing Zhang:
The Core Drugs Analysis based on Social Network Analysis about Traditional Chinese Medicine Records Semantic Relation. ITQM 2014: 328-335 - 2013
- [j4]Liqiang Peng, Lei Hu, Jun Xu, Yonghong Xie, Jinyin Zuo:
Analysis of two knapsack public key cryptosystems. IET Commun. 7(15): 1638-1643 (2013) - [c8]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Inscrypt 2013: 39-51 - [c7]Wenbin Qian, Bingru Yang, Yonghong Xie, Hui Li:
A rule extraction algorithm based on compound attribute measure in decision systems. FSKD 2013: 407-411 - [c6]Wenbin Qian, Yonghong Xie, Bingru Yang:
A dynamic attribute reduction algorithm based on compound attribute measure. GrC 2013: 236-241 - [i1]Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang:
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 547 (2013) - 2012
- [j3]Yonghong Xie, Lei Hu:
A matrix construction of Boolean functions with maximum algebraic immunity. J. Syst. Sci. Complex. 25(4): 792-801 (2012) - 2011
- [j2]Bingru Yang, Wu Qu, Yonghong Xie, Yun Zhai:
Predicting protein second structure using a novel hybrid method. Expert Syst. Appl. 38(9): 11657-11664 (2011) - [c5]Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:
Cube Cryptanalysis of Hitag2 Stream Cipher. CANS 2011: 15-25
2000 – 2009
- 2009
- [c4]Wei Hou, Bingru Yang, Yonghong Xie, Chensheng Wu:
Mining Multi-relational Frequent Patterns in Data Streams. BIFE 2009: 205-209 - [c3]Zhen Peng, Bingru Yang, Yonghong Xie:
RBFCM Based Heuristic Coordinator Algorithm for KDD. ICNC (5) 2009: 68-72 - 2003
- [j1]Qiang Li, Yonghong Xie:
Randomised hough transform with error propagation for line and circle detection. Pattern Anal. Appl. 6(1): 55-64 (2003) - 2002
- [c2]Yonghong Xie, Qiang Ji:
A New Efficient Ellipse Detection Method. ICPR (2) 2002: 957-960 - 2001
- [c1]Yonghong Xie, Qiang Ji:
Effective line detection with error propagation. ICIP (1) 2001: 181-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint