Follow
Zhoujun Li
Title
Cited by
Cited by
Year
Sequential matching network: A new architecture for multi-turn response selection in retrieval-based chatbots
Y Wu, W Wu, C Xing, M Zhou, Z Li
arXiv preprint arXiv:1612.01627, 2016
4352016
TI-CNN: Convolutional neural networks for fake news detection
Y Yang, L Zheng, J Zhang, Q Cui, Z Li, PS Yu
arXiv preprint arXiv:1806.00749, 2018
1972018
Emerging topic detection for organizations from microblogs
Y Chen, H Amiri, Z Li, TS Chua
Proceedings of the 36th international ACM SIGIR conference on Research and …, 2013
1722013
Building task-oriented dialogue systems for online shopping
Z Yan, N Duan, P Chen, M Zhou, J Zhou, Z Li
Thirty-first AAAI conference on artificial intelligence, 2017
1572017
Docchat: An information retrieval approach for chatbot engines using unstructured documents
Z Yan, N Duan, J Bao, P Chen, M Zhou, Z Li, J Zhou
Proceedings of the 54th Annual Meeting of the Association for Computational …, 2016
1302016
MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades
S Wang, X Hu, PS Yu, Z Li
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1302014
Question retrieval with high quality answers in community question answering
K Zhang, W Wu, H Wu, Z Li, M Zhou
Proceedings of the 23rd ACM international conference on conference on …, 2014
1272014
Concept-based short text classification and ranking
F Wang, Z Wang, Z Li, JR Wen
Proceedings of the 23rd ACM International Conference on Conference on …, 2014
1242014
Image–text sentiment analysis via deep multimodal attentive fusion
F Huang, X Zhang, Z Zhao, J Xu, Z Li
Knowledge-Based Systems 167, 26-37, 2019
1232019
Event detection and popularity prediction in microblogging
X Zhang, X Chen, Y Chen, S Wang, Z Li, J Xia
Neurocomputing 149, 1469-1480, 2015
1142015
Cryptanalysis of simple three-party key exchange protocol
H Guo, Z Li, Y Mu, X Zhang
Computers & Security 27 (1-2), 16-21, 2008
1092008
Adaptive management of virtualized resources in cloud computing using feedback control
Q Li, Q Hao, L Xiao, Z Li
2009 First International Conference on Information Science and Engineering …, 2009
1032009
A detection and offense mechanism to defend against application layer DDoS attacks
J Yu, Z Li, H Chen, X Chen
International Conference on Networking and Services (ICNS'07), 54-54, 2007
1032007
Response generation by context-aware prototype editing
Y Wu, F Wei, S Huang, Y Wang, Z Li, M Zhou
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 7281-7288, 2019
1012019
Keyphrase generation with correlation constraints
J Chen, X Zhang, Y Wu, Z Yan, Z Li
arXiv preprint arXiv:1808.07185, 2018
992018
Comparable entity mining from comparative questions
S Li, CY Lin, YI Song, Z Li
IEEE transactions on knowledge and data engineering 25 (7), 1498-1509, 2011
952011
Applying adaptive over-sampling technique based on data density and cost-sensitive SVM to imbalanced learning
S Wang, Z Li, W Chao, Q Cao
The 2012 international joint conference on neural networks (IJCNN), 1-8, 2012
932012
Biclustering of microarray data with MOSPO based on crowding distance
J Liu, Z Li, X Hu, Y Chen
BMC bioinformatics 10 (4), 1-10, 2009
902009
Tablebank: Table benchmark for image-based table detection and recognition
M Li, L Cui, S Huang, F Wei, M Zhou, Z Li
Proceedings of The 12th language resources and evaluation conference, 1918-1925, 2020
882020
A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules
Y Yao, J Mi, Z Li
Fuzzy Sets and Systems 236, 58-72, 2014
822014
The system can't perform the operation now. Try again later.
Articles 1–20