- Recommender Systems and Techniques
- Digital Marketing and Social Media
- Expert finding and Q&A systems
- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Topic Modeling
- Technology Adoption and User Behaviour
- Knowledge Management and Sharing
- Information Retrieval and Search Behavior
- Sentiment Analysis and Opinion Mining
- Blockchain Technology Applications and Security
- Diverse Aspects of Tourism Research
- Social Media and Politics
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Mobile Crowdsensing and Crowdsourcing
- Advanced Bandit Algorithms Research
- Innovation and Knowledge Management
- Privacy-Preserving Technologies in Data
- Web Data Mining and Analysis
- Spam and Phishing Detection
- Service-Oriented Architecture and Web Services
- Mathematical and Theoretical Epidemiology and Ecology Models
- Chinese history and philosophy
- Advanced Thermodynamics and Statistical Mechanics
Beihang University
2015-2025
State Grid Corporation of China (China)
2023-2025
Fuzhou University
2023-2024
Sichuan Normal University
2020-2023
California Baptist University
2023
Swinburne University of Technology
2023
Mississippi State University
2022
Southwestern University of Finance and Economics
2022
University of Electronic Science and Technology of China
2022
Shandong University
2022
The objective of this study was to investigate the prevalence and risk factors syphilis infection among female sex workers in a southwestern Chinese city along drug trafficking route.From December 2004 January 2005, 343 (FSWs) were recruited through community outreach peer referring. Confidential questionnaire interviews administered collect information on sexual other sexually transmitted diseases/HIV behaviors. Cervical blood samples collected test for HIV antibodies Neisseria gonorrhoeae...
With the emergence of decentralized cryptocurrencies such as Bitcoin, it has become very difficult for law enforcement to detect suspicious activities, identify users and obtain transaction records criminals who utilize pseudoanonymity provided by cryptocurrency system. Address clustering aims break linking addresses that are controlled same user based on information available from blockchain, graphs. There already two widely used heuristics Bitcoin address clustering. One is multiple input...
This study empirically examines the impact of individual motivation on innovation performance, where innovative behavior serves as a mediating construct, and discusses whether climate has moderating effect. combines Cognitive Evaluation Theory behavioral performance to develop new theoretical method for explaining relationships between motivation, behavior, performance. Data collected via field 250 subjects who participated in science technology competition were analyzed using PLS-SEM model....
Collaborative filtering requires a centralized rating database. However, within peer-to-peer network such database is not readily available. In this paper, we propose fully distributed collaborative method that self-organizing and operates in way. Similarity ranks between multimedia files (items) are calculated by log-based user profiles stored locally at these items so-called buddy tables. This intuitively creates semantic overlay to organize files. Based on the has downloaded previously...
In the big data era, destination images have played an increasingly important role in tourism development. However, seldom research has utilised analytics to examine from travel blogs. Therefore, this study proposes and evaluates a analytical approach using latent Dirichlet allocation extract attributes of online 140,286 blogs about 20 cities China. Results reveal 14 dimensions with 54 studied cities. Interesting findings are discovered between This also summarises implications for practice.
From the end of 2018 in China, Big-data Driven Price Discrimination (BDPD) online consumption raised public debate on social media. To study consumers' attitude about BDPD, this constructed a semantic recognition frame to deconstruct Affection-Behavior-Cognition (ABC) consumer theory using machine learning models inclusive Labeled Latent Dirichlet Allocation (LDA), Long Short-Term Memory (LSTM), and Snow Natural Language Processing (NLP), based media comments text dataset. Similar...
Strategic planning and talent management in large enterprises composed of knowledge workers requires complete, accurate, up-to-date representation the expertise employees a form that integrates with business processes. Like other similar organizations operating dynamic environments, IBM Corporation strives to maintain such current correct information, specifically assessments against job roles skill sets from its taxonomy. In this work, we deploy an analytics-driven solution infers through...
Purpose The purpose of this study is to test the impact time and price sensitivity on consumer satisfaction purchase intention online-to-offline (O2O) takeout platforms explore moderating effect preference satisfaction, as well in order guide market pricing. Design/methodology/approach A structural equation model (SEM) customer was constructed, relationships between variables (time sensitivity, intention) were examined. completed questionnaires 349 respondents collected from Questionnaire...
Purpose Given the critical role of user-generated content (UGC) in e-commerce, exploring various aspects UGC can aid understanding user purchase intention and commodity recommendation. Therefore, this study investigates impact on decisions proposes new recommendation models based sentiment analysis, which are verified Douban, one most popular websites China. Design/methodology/approach After verifying relationship between factors product sales, two models, collaborative filtering model (SCF)...
Abstract With the rapid development of blockchain technology, it shows great potential in data owner rights protection and digital identity management. In this study, a shared system for owners management were constructed using architecture system, combined with cryptography technology. Additionally, functional module design is implemented both groups systems, performance verified through simulation experiments. The throughput PBFT consensus algorithm used paper’s entitlement 1281, 1319,...
Purpose This study investigates the moderating effects of consumers’ occupations on their purchase intentions (PIs) for food takeout services using a modified unified theory acceptance and use technology model. It evaluates how different influence relationships between social (SI), expectation confirmation (EC), facilitating conditions (FC) PI. Design/methodology/approach The collected data from individuals in various occupations, including technical/associate professionals,...