Guofu Li

ORCID: 0000-0001-5838-5722
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Collaboration in agile enterprises
  • Language, Metaphor, and Cognition
  • Natural Language Processing Techniques
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Advanced Text Analysis Techniques
  • Semantic Web and Ontologies
  • Lightning and Electromagnetic Phenomena
  • Industrial Technology and Control Systems
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Software System Performance and Reliability
  • Explainable Artificial Intelligence (XAI)
  • Vacuum and Plasma Arcs
  • Software Engineering Research
  • Security in Wireless Sensor Networks
  • Advanced Graph Neural Networks
  • Fire effects on ecosystems
  • Sentiment Analysis and Opinion Mining
  • Imbalanced Data Classification Techniques
  • Service-Oriented Architecture and Web Services
  • Cryptography and Data Security
  • Color perception and design
  • Biomedical Text Mining and Ontologies

Xinjiang University of Finance and Economics
2023

Ningbo University
2006-2022

First Affiliated Hospital of Hebei Medical University
2022

Ping An (China)
2020-2021

University of Shanghai for Science and Technology
2017-2020

University College Dublin
2008-2019

China Electric Power Research Institute
2012-2014

North China Electric Power University
2012-2014

Korea Advanced Institute of Science and Technology
2013-2014

Central South University
2010

This report summarizes the objectives and evaluation of SemEval 2015 task on sentiment analysis figurative language Twitter (Task 11).This is first wholly dedicated to analyzing Twitter.Specifically, three broad classes are considered: irony, sarcasm metaphor.Gold standard sets 8000 training tweets 4000 test were annotated using workers crowdsourcing platform CrowdFlower.Participating systems required provide a fine-grained score an 11-point scale (-5 +5, including 0 for neutral intent) each...

10.18653/v1/s15-2080 article EN cc-by Proceedings of the 16th International Workshop on Semantic Evaluation (SemEval-2022) 2015-01-01

Adversarial machine learning is a fast growing research area, which considers the scenarios when systems may face potential adversarial attackers, who intentionally synthesize input data to make well-trained model mistake. It always involves defending side, usually classifier, and an attacking side that aims cause incorrect output. The earliest studies on examples for algorithms start from information security much wider varieties of methods. But recent focus popularized by deep community...

10.48550/arxiv.1810.07339 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Wireless sensor networks (WSNs) have been pushed to the forefront in past decade, owing advert of Internet Things. Our research suggests that reliability and lifetime performance a typical application WSNs depends crucially on set parameters. In this paper, we implemented our experiments nearest closer protocol with J-Sim simulation tool. We then analyze closure relationships among density, lifetime, reveal trade-off them based analysis experiment results. Next, propose five intelligent...

10.1109/access.2018.2825441 article EN cc-by-nc-nd IEEE Access 2018-01-01

The next-generation network (6G) has more strict requirements for the online learning ability and high interpretability of learned systems. Machine is expected to be essential assist in making networks efficient adaptable, but most promising methods often are treated as "black boxes" due deep structures nonlinearity. Therefore, this article attempts study interpretations machine algorithms make them applicable 6G-enabled Internet things (IoT) networks. Typically, focuses on new model...

10.1109/jiot.2020.3048793 article EN IEEE Internet of Things Journal 2021-01-01

10.1007/s12652-018-0714-6 article EN Journal of Ambient Intelligence and Humanized Computing 2018-02-16

Concept taxonomies offer a powerful means for organizing knowledge, but this organization must allow many overlapping and fine-grained perspectives if general-purpose taxonomy is to reflect concepts as they are actually employed reasoned about in everyday usage. We present here of bootstrapping finely-discriminating from variety different starting points, or seeds, that acquired three sources: WordNet, ConceptNet the web at large.

10.3115/1609067.1609160 article EN 2009-01-01

Introspection is a question-led process in which one builds on what already knows to explore possible and plausible. In creative introspection, whether art or science, framing the right question as important finding answer. Presupposition-laden questions are themselves source of knowledge, this paper we show how widely-held beliefs about world can be dynamically acquired by harvesting such from Web. We metaphorical reasoning modeled an introspective process, that harvested Web pose further...

10.1609/aaai.v25i1.8073 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2011-08-04

Risk control has always been a major challenge in finance. Overdue repayment is frequently encountered discreditable behavior online lending. Motivated by the powerful capabilities of deep neural networks, we propose fusion learning approach, namely AD-MBLSTM, based on network (DNN), multi-layer bi-directional long short-term memory (LSTM) (BiLSTM) and attention mechanism for overdue forecasting according to historical records. Furthermore, present novel feature derivation selection method...

10.3390/app10238491 article EN cc-by Applied Sciences 2020-11-27

10.1016/j.jnca.2009.12.012 article EN Journal of Network and Computer Applications 2009-12-24

The age of Internet things gives rise to more challenges various secure demands when designing the protocols, such as object identification and tracking, privacy control. In many current a malicious server may cheat users if it was legal server, making vital verify legality both servers with help trusted third-party, registration center. Li et al. proposed an authentication protocol based on dynamic identity for multi-server environment, which is still susceptible password-guessing attack,...

10.1177/1550147718777654 article EN cc-by International Journal of Distributed Sensor Networks 2018-05-01

Twitter is an intriguing source of topical content for tasks involving the detection phenomena such as sarcasm and metaphor. The hashtags that users employ to self-annotate their own micro-texts can often facilitate targeted retrieval texts with desired characteristics. Though tweets tagged #sarcasm are highly likely be sarcastic, lack a topic model sarcastic makes it difficult detect when tags used in expected way, or indeed, retrieve not explicitly this way. In study, we explore how...

10.1145/2824864.2824866 article EN 2015-01-01

According to the working characteristics of over-voltage protective device for series compensation, principle and structure spark switch were introduced in this paper briefly. Special test loop HV fast switch-off designed evaluate performance swich trials. Test data mathematic statistic results revealed that self-breakdown probability obeyed normal distribution cumulative had been less affected by different enviroment temperature. The number trials was restricted insulated gas electrode...

10.5370/jicee.2014.4.2.130 article EN Journal of International Council on Electrical Engineering 2014-04-01
Coming Soon ...