关注
Lu Zhang
Lu Zhang
Nanjing Audit University
在 seu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
hPSD: a hybrid PU-learning-based spammer detection model for product reviews
Z Wu, J Cao, Y Wang, Y Wang, L Zhang, J Wu
IEEE transactions on cybernetics 50 (4), 1595-1606, 2018
1632018
Personalized itinerary recommendation: Deep and collaborative learning with textual information
L Chen, L Zhang, S Cao, Z Wu, J Cao
Expert Systems with Applications 144, 113070, 2020
612020
Detecting spammer groups from product reviews: a partially supervised learning model
L Zhang, Z Wu, J Cao
IEEE access 6, 2559-2568, 2017
592017
Spammers detection from product reviews: a hybrid model
Z Wu, Y Wang, Y Wang, J Wu, J Cao, L Zhang
2015 IEEE International Conference on Data Mining, 1039-1044, 2015
522015
Efficiently translating complex SQL query to mapreduce jobflow on cloud
Z Wu, A Song, J Cao, J Luo, L Zhang
IEEE transactions on cloud computing 8 (2), 508-517, 2017
482017
Game theory based emotional evolution analysis for chinese online reviews
Z Bu, H Li, J Cao, Z Wu, L Zhang
Knowledge-Based Systems 103, 60-72, 2016
402016
Online identification of Tor anonymous communication traffic
何高峰, 杨明, 罗军舟, 张璐
Journal of Software 24 (3), 540-556, 2013
342013
A pattern-based topic detection and analysis system on Chinese tweets
L Zhang, Z Wu, Z Bu, Y Jiang, J Cao
Journal of computational science 28, 369-381, 2018
312018
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans
W Hu, L Zhang, A Ardeshiricham, J Blackstone, B Hou, Y Tai, R Kastner
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 707-713, 2017
312017
A comparative study on shilling detection methods for trustworthy recommendations
Y Wang, L Qian, F Li, L Zhang
Journal of Systems Science and Systems Engineering 27, 458-478, 2018
232018
Electrical fault diagnosis from text data: A supervised sentence embedding combined with imbalanced classification
X Jing, Z Wu, L Zhang, Z Li, D Mu
IEEE Transactions on Industrial Electronics 71 (3), 3064-3073, 2023
202023
Application-level attack against Tor's hidden service
L Zhang, J Luo, M Yang, G He
2011 6th International Conference on Pervasive Computing and Applications …, 2011
202011
Examining the consequences of high-level synthesis optimizations on power side-channel
L Zhang, W Hu, A Ardeshiricham, Y Tai, J Blackstone, D Mu, R Kastner
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
172018
A comparative study of shilling attack detectors for recommender systems
Y Wang, L Zhang, H Tao, Z Wu, J Cao
2015 12th International Conference on Service Systems and Service Management …, 2015
172015
Memory-based high-level synthesis optimizations security exploration on the power side-channel
L Zhang, D Mu, W Hu, Y Tai, J Blackstone, R Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
152019
Spotting review spammer groups: a cosine pattern and network based method
L Zhang, G He, J Cao, H Zhu, B Xu
Concurrency and Computation: Practice and Experience 30 (20), e4686, 2018
152018
Tor 匿名通信流量在线识别方法
何高峰, 杨明, 罗军舟, 张璐
软件学报 24 (3), 540-556, 2013
152013
Performance analysis of BBR congestion control protocol based on NS3
H Zhang, H Zhu, Y Xia, L Zhang, Y Zhang, Y Deng
2019 Seventh International Conference on Advanced Cloud and Big Data (CBD …, 2019
142019
An improved DSSS-based flow marking technique for anonymous communication traceback
L Zhang, J Luo, M Yang
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
142009
基于时隙质心流水印的匿名通信追踪技术
张璐, 罗军舟, 杨明, 何高峰
软件学报 22 (10), 2358-2371, 2011
132011
系统目前无法执行此操作,请稍后再试。
文章 1–20