Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Expert Recommendation in Community Question Answering via Heterogeneous Content Network Embedding

    Hong Li1,*, Jianjun Li1, Guohui Li1, Rong Gao2, Lingyu Yan2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1687-1709, 2023, DOI:10.32604/cmc.2023.035239

    Abstract Expert Recommendation (ER) aims to identify domain experts with high expertise and willingness to provide answers to questions in Community Question Answering (CQA) web services. How to model questions and users in the heterogeneous content network is critical to this task. Most traditional methods focus on modeling questions and users based on the textual content left in the community while ignoring the structural properties of heterogeneous CQA networks and always suffering from textual data sparsity issues. Recent approaches take advantage of structural proximities between nodes and attempt to fuse the textual content of nodes for modeling. However, they often fail… More >

  • Open Access

    ARTICLE

    Byte-Level Function-Associated Method for Malware Detection

    Jingwei Hao*, Senlin Luo, Limin Pan

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 719-734, 2023, DOI:10.32604/csse.2023.033923

    Abstract The byte stream is widely used in malware detection due to its independence of reverse engineering. However, existing methods based on the byte stream implement an indiscriminate feature extraction strategy, which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes, resulting in byte semantic confusion. To address this issue, an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure, code, and data. The Minhash algorithm, grayscale mapping, and state transition probability statistics… More >

  • Open Access

    ARTICLE

    Semantic Modeling of Events Using Linked Open Data

    Sehrish Jamil1, Salma Noor1,*, Iftikhar Ahmed2, Neelam Gohar1, Fouzia1

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 511-524, 2021, DOI:10.32604/iasc.2021.017770

    Abstract Significant happenings in terms of spatio-temporal factors are called events. In the digital age, these events and their associated features are scattered in various databases on the Internet. The event data are in heterogeneous formats, which are often not machine-readable. This leads to a lack of unification of event-related knowledge across different domains and results in a research gap in terms of event modeling and representation. Specialized event models are needed to overcome this gap and integrate relevant information of different similar events occurring worldwide. Our research explores the problem of heterogeneity in specialized event modeling and takes modeling for… More >

Displaying 1-10 on page 1 of 3. Per Page