JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (9): 105-113.doi: 10.6040/j.issn.1671-9352.1.2018.115
Previous Articles Next Articles
YANG Ya-ru*, WANG Yong-qing, ZHANG Zhi-bin, LIU Yue, CHENG Xue-qi
CLC Number:
[1] MANIKONDA L, MEDURI V V, KAMBHAMPATI S. Tweeting the mind and instagramming the heart: exploring differentiated content sharing on social media[C] //Tenth International AAAI Conference on Web and Social Media. Cologne: AAAI Press, 2016: 639-642. [2] CARMAGNOLA F, CENA F. User identification for cross-system personalisation[J]. Information Sciences, 2009, 179(1/2):16-32. [3] DENG Z, SANG J, XU C. Personalized video recommendation based on cross-platform user modeling[C] // 2013 IEEE International Conference on Multimedia and Expo(ICME). San Jose: IEEE, 2013: 1-6. [4] YAN M, SANG J, MEI T, et al. Friend transfer: cold-start friend recommendation with cross-platform transfer learning of social knowledge[C] // 2013 IEEE International Conference on Multimedia and Expo(ICME). San Jose: IEEE, 2013: 1-6. [5] KUMAR S, ZAFARANI R, LIU H. Understanding user migration patterns in social media[C] // AAAI. San Francisco: AI Access Foundation, 2011, 11:8-11. [6] SHU K, WANG S H, TANG J L, et al. User identity linkage across online social networks[J]. ACM SIGKDD Explorations Newsletter, 2017, 18(2):5-17. [7] ZAFARANI R, LIU H. Connecting users across social media sites: a behavioral-modeling approach[C] // Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Chicago: ACM, 2013: 41-49. [8] MAN T, SHEN H, LIU S, et al. Predict anchor links across social networks via an embedding approach[C] // IJCAI. New York: International Joint Conferences on Artificial Intelligence, 2016, 16:1823-1829. [9] LIU S, WANG S, ZHU F, et al. Hydra: large-scale social identity linkage via heterogeneous behavior modeling[C] // Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. Snowbird: ACM, 2014: 51-62. [10] RONG X. word2vec parameter learning explained[J]. arXiv preprint arXiv:1411.2738, 2014. [11] KLEMA V, LAUB A. The singular value decomposition: its computation and some applications[J]. IEEE Transactions on Automatic Control, 1980, 25(2):164-176. [12] CUI Y, PEI J, TANG G T, et al. Finding email correspondents in online social networks[J]. World Wide Web, 2013, 16(2):195-218. [13] TANG J, QU M, WANG M, et al. Line: large-scale information network embedding[C] // Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee. Florence: Association for Computing Machinery, 2015: 1067-1077. [14] RUCK D W, ROGERS S K, KABRISKY M, et al. The multilayer perceptron as an approximation to a Bayes optimal discriminant function[J]. IEEE Transactions on Neural Networks, 1990, 1(4):296-298. [15] KONG X, ZHANG J, YU P S. Inferring anchor links across multiple heterogeneous social networks[C] // Proceedings of the 22nd ACM International Conference on Information & Knowledge Management. San Francisco: ACM, 2013: 179-188. |
[1] | ZHANG Peng, WANG Su-ge, LI De-yu, WANG Jie. A semi-supervised spam review classification method based on heuristic rules [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 44-51. |
[2] | HUANG Tian-yi, ZHU William. Cost-sensitive feature selection via manifold learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 91-96. |
[3] | SU Feng-long, XIE Qing-hua, HUANG Qing-quan, QIU Ji-yuan, YUE Zhen-jun. Semi-supervised method for attribute extraction based on transductive learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 111-115. |
[4] | DU Hong-le, ZHANG Yan, ZHANG Lin. Intrusion detection on imbalanced dataset [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 50-57. |
[5] | CHEN Ya-dong, HONG Yu, YANG Xue-rong, WANG Xiao-bin, YAO Jian-min, ZHU Qiao-ming. Automatic target identification in frame semantic parsing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 45-53. |
|