Xue Li
Xue Li
Verified email at - Homepage
Cited by
Cited by
Time weight collaborative filtering
Y Ding, X Li
Proceedings of the 14th ACM international conference on Information and …, 2005
A survey of sentiment analysis in social media
L Yue, W Chen, X Li, W Zuo, M Yin
Knowledge and Information Systems 60, 617-663, 2019
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection
T Chen, X Li, H Yin, J Zhang
Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 …, 2018
RFID data management: challenges and opportunities
R Derakhshan, ME Orlowska, X Li
2007 IEEE International conference on RFID, 175-182, 2007
PME: projected metric embedding on heterogeneous networks for link prediction
H Chen, H Yin, W Wang, H Wang, QVH Nguyen, X Li
Proceedings of the 24th ACM SIGKDD international conference on knowledge …, 2018
Deep attention-based spatially recursive networks for fine-grained visual recognition
L Wu, Y Wang, X Li, J Gao
IEEE transactions on cybernetics 49 (5), 1791-1802, 2018
Where-and-when to look: Deep siamese attention networks for video-based person re-identification
L Wu, Y Wang, J Gao, X Li
IEEE Transactions on Multimedia 21 (6), 1412-1424, 2018
Enabling next-generation RFID applications: Solutions and challenges
QZ Sheng, X Li, S Zeadally
Computer 41 (9), 21-28, 2008
Suicidal ideation detection: A review of machine learning methods and applications
S Ji, S Pan, X Li, E Cambria, G Long, Z Huang
IEEE Transactions on Computational Social Systems 8 (1), 214-226, 2021
Electricity market price spike forecast with data mining techniques
X Lu, ZY Dong, X Li
Electric power systems research 73 (1), 19-29, 2005
A framework for electricity price spike analysis with advanced data mining methods
JH Zhao, ZY Dong, X Li, KP Wong
IEEE Transactions on Power Systems 22 (1), 376-385, 2007
Deep adaptive feature embedding with local sample distributions for person re-identification
L Wu, Y Wang, J Gao, X Li
Pattern Recognition 73, 275-288, 2018
An effective approach for cyberbullying detection
V Nahar, X Li, C Pang
Communications in information science and management engineering 3 (5), 238, 2013
Learning private neural language modeling with attentive aggregation
S Ji, S Pan, G Long, X Li, J Jiang, Z Huang
2019 International joint conference on neural networks (IJCNN), 1-8, 2019
Cyber physical power systems: architecture, implementation techniques and challenges
J Zhao, F Wen, Y Xue, X Li, Z Dong
Dianli Xitong Zidonghua/Automation of Electric Power Systems 34 (16), 1-7, 2010
Emerging event detection in social networks with location sensitivity
S Unankard, X Li, MA Sharaf
World Wide Web 18, 1393-1417, 2015
What-and-where to match: Deep spatially multiplicative integration networks for person re-identification
L Wu, Y Wang, X Li, J Gao
Pattern Recognition 76, 727-738, 2018
Semi-supervised learning for cyberbullying detection in social networks
V Nahar, S Al-Maskari, X Li, C Pang
Databases Theory and Applications: 25th Australasian Database Conference …, 2014
Recency-based collaborative filtering
Y Ding, X Li, ME Orlowska
Proceedings of the 17th Australasian Database Conference-Volume 49, 99-107, 2006
Compressive representation for device-free activity recognition with passive RFID signal strength
L Yao, QZ Sheng, X Li, T Gu, M Tan, X Wang, S Wang, W Ruan
IEEE Transactions on Mobile Computing 17 (2), 293-306, 2017
The system can't perform the operation now. Try again later.
Articles 1–20