Tong Li (李童)
Beijing University of Technology
H-index: 21
Asia-China
Top articles of Tong Li (李童)
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment | International Journal of Software Engineering and Knowledge Engineering | Di Wu Tong Li Yiran Zhao Junrui Liu Zifang Tang | 2024/2/2 |
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners’ voices from Stack Overflow | Tong Li Xinran Zhang Yunduo Wang Qixiang Zhou Yiting Wang | 2024/4/27 | |
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double‐layer selection evolutionary algorithm | Concurrency and Computation: Practice and Experience | Di Wu Zhen Yang Tong Li Junrui Liu | 2024/2/15 |
Detecting APT Attacks Using An Attack Intent-Driven and Sequence-Based Learning Approach | Computers & Security | Hao Yue Tong Li Di Wu Runzi Zhang Zhen Yang | 2024/2/8 |
Fusion learning of preference and bias from ratings and reviews for item recommendation | Data & Knowledge Engineering | Junrui Liu Tong Li Zhen Yang Di Wu Huan Liu | 2024/2/3 |
Philanthropic conference-based requirements engineering in time of pandemic and beyond | Requirements Engineering | Meira Levy Irit Hadar Jennifer Horkoff Jane Huffman Hayes Barbara Paech | 2023/6 |
Improving Requirements Classification Models Based on Explainable Requirements Concerns | Lu Han QiXiang Zhou Tong Li | 2023/9/4 | |
A Requirements-Driven Framework for Automatic Data Visualization | Tong Li Xiang Wei Yiting Wang | 2023/5/31 | |
Discovering runtime requirements from user interactions: ideas and preliminary studies | Tong Li Xinran Zhang Yiting Wang | 2023/9/4 | |
Evaluating the intelligence capability of smart homes: A conceptual modeling approach | Data & Knowledge Engineering | Di Wu Weite Feng Tong Li Zhen Yang | 2023/11/1 |
Defending against social engineering attacks: A security pattern‐based analysis framework | IET Information Security | Tong Li Chuanyong Song Qinyu Pang | 2023/7 |
A Deep Learning-Based Method for Identifying User Story Semantic Conflicts | Tianci Wang Chunwang Li Chunhui Wang Tong Li Ye Zhai | 2023/10/22 | |
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation | Yu Liu Tong Li Zheqing Huang Zhen Yang | 2023/5/14 | |
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information | Jinyi Wang Tong Li Hongyu Gao | 2023/6/26 | |
How Stakeholders’ Data Literacy Contributes to Quality in Higher Education: A Goal-Oriented Analysis | Nan Yang Tong Li | 2023/3/8 | |
A Two-tier Shared Embedding Method for Review-based Recommender Systems | Zhen Yang Junrui Liu Tong Li Di Wu Shiqiu Yang | 2023/10/21 | |
Dealing with Explainability Requirements for Machine Learning Systems | Tong Li Lu Han | 2023/6/26 | |
A Systematic Literature Review of reinforcement learning-based knowledge graph research | Zifang Tang Tong Li Di Wu Junrui Liu Zhen Yang | 2023/9/29 | |
An effective points of interest recommendation approach based on embedded meta‐path of spatiotemporal data | Expert Systems | Rui Song Tong Li Xin Dong Zhiming Ding | 2023/2 |
An Improved Force-Directed Automatic Layout Method for Undirected Compound Graphs | Junyao Liu Zhongnan Wang Jiamin Yu Haitian Liu Tong Li | 2022 |