Abstract is missing.
- Introduction to the MDATA ModelYan Jia 0001, Zhaoquan Gu, Aiping Li, Weihong Han. 1-18 [doi]
- The Framework of the MDATA Computing ModelYan Jia 0001, Aiping Li, Zhaoquan Gu, Bin Zhou 0004, Ye Wang 0015, Xiang Wang, Hongkui Tu. 19-31 [doi]
- Spatiotemporal Data Cleaning and Knowledge FusionHuchen Zhou, Mohan Li, Zhaoquan Gu, Zhihong Tian. 32-50 [doi]
- Chinese Named Entity Recognition: Applications and ChallengesQisen Xi, Yizhi Ren, Siyu Yao, Guohua Wu, Gongxun Miao, Zhen Zhang. 51-81 [doi]
- Joint Extraction of Entities and Relations: An Advanced BERT-based Decomposition MethodChanghai Wang, Aiping Li. 82-98 [doi]
- Entity Alignment: Optimization by Seed SelectionXiaolong Chen, Le Wang 0008, Yunyi Tang, Weihong Han, Zhihong Tian, Zhaoquan Gu. 99-116 [doi]
- Knowledge Extraction: Automatic Classification of Matching RulesYunyi Tang, Le Wang 0008, Xiaolong Chen, Zhaoquan Gu, Zhihong Tian. 117-130 [doi]
- Network Embedding Attack: An Euclidean Distance Based MethodShanqing Yu, Jun Zheng, Yongqi Wang, Jinyin Chen, Qi Xuan, Qingpeng Zhang. 131-151 [doi]
- Few-Shot Knowledge Reasoning: An Attention Mechanism Based MethodHaocheng Xie, Aiping Li, Yan Jia 0001. 152-164 [doi]
- Applications of Knowledge Representation LearningChenchen Li, Aiping Li, Ye Wang, Hongkui Tu. 165-184 [doi]
- Detection and Defense Methods of Cyber AttacksKai Xing, Aiping Li, Rong Jiang, Yan Jia 0001. 185-198 [doi]
- A Distributed Framework for APT Attack AnalysisYulu Qi, Rong Jiang, Aiping Li, Zhaoquan Gu, Yan Jia 0001. 199-219 [doi]
- Social Unrest Events Prediction by Contextual Gated Graph Convolutional NetworksHaiyang Wang, Bin Zhou 0004, Zhipin Gu, Yan Jia 0001. 220-233 [doi]
- Information Cascading in Social NetworksLiqun Gao, Bin Zhou 0004, Yan Jia 0001, Hongkui Tu, Ye Wang 0015. 234-254 [doi]