﻿{"id":1201,"date":"2018-09-07T18:32:16","date_gmt":"2018-09-07T10:32:16","guid":{"rendered":"http:\/\/www.nlpir.org\/wordpress\/?p=1201"},"modified":"2026-03-19T21:43:05","modified_gmt":"2026-03-19T13:43:05","slug":"__trashed","status":"publish","type":"post","link":"http:\/\/www.nlpir.org\/wordpress\/2018\/09\/07\/__trashed\/","title":{"rendered":"\u79d1\u7814 Research"},"content":{"rendered":"<h2><strong>Research Projects\uff1a<\/strong><\/h2>\n<div>\n<div>\n<p>Research on Machine Translation and Content Generation for Minor Languages Using Multilingual Knowledge and Few Shot Learning\uff1b Foundation Augumentation Program Technical Funding<span class=\"fontstyle0\">\uff082021-JCJQ-JJ-0059\uff09<\/span>; 2021.10-2024.10;2M\uff1bHosted by Huaping Zhang<\/p>\n<p>Research on Chinese Text Profreading Based on Pretrained Language Model and Domain Knowledge Graph\uff1b Beijing Municipal Natural Science Foundation (Grant No.4212026); 2021.1-2023.12;200K\uff1bHosted by Huaping Zhang<\/p>\n<p>Research on Natural Language Generation; China Electronics Technology Group Corporation; 2020.7-2021.12; 8.97m\uff1bHosted by Huaping Zhang<\/p>\n<p>Research on Chinese Text Profreading Based on Pretrained Language Model and Domain Knowledge Graph(4212026)\uff1bNational Science Foundation of China in Beijing; 2021.1-2024.12;200K\uff1bHost by Huaping Zhang<\/p>\n<p>Research on Natural Language Generation; China Electronics Technology Group Corporation; 2020.7-2021.12; 8.97m\uff1bHost by Huaping Zhang<\/p>\n<p>Research on Configure Security\uff1b 2021.1-2022.12; 3m\uff1bHost by Huaping Zhang<\/p>\n<p>Research on Web Public Opinion Mining on Justice Domain 2018YFC0832304 121<\/p>\n<\/div>\n<div>Research on Targeted Group Detection Using Semantic Topic and Social Relationship\uff1bNational Science Foundation of China (NSFC, Grand No: 61772075);\u00a02018.1-2021.12;610K\uff1bLeader\uff1aHuaping Zhang;<\/div>\n<div>Web Log Analysis and User Portrait \uff0cNational 242 Security Plan, 700K 2016.6-2017.5 2016A83;Leader\uff1aHuaping Zhang;<\/div>\n<p>Credit System Architecture Design for the People\u2019s Central Bank of China, 2015.5-10<\/p>\n<div>Key Technology on Text Mining\uff0cNational 242 Security Plan, 800K 2014.11-2015.5 ;2014A10; Leader\uff1aHuaping Zhang;<\/div>\n<p>Basic Research on Social Networks Analysis and Information Communication, The State 973 Key Basic Research and Development Program\uff0c96\uff0c2013.1-2017.12\uff0c sub-project leader: Huaping Zhang; 2013CB329606<br \/>\nResearch on Sentiment Analysis in Microblogs based on users personalization.840.2013.1-2016.12.National Science Foundation of China (NSFC, Grand No: 61272362); Leader:Huaping Zhang<br \/>\nXinjiang Uygur Web Crawlering and Search; Science and technology supporting Program in Xijing District; 2012.1-2013.12 2<\/p>\n<p>Meteorological Report Generation Based on Time and Space Inference, China\u00a0Meteorological Admininstration,2010.9-2011.9<br \/>\nChina Postal Address Search,China Post Group, 2011.1-2011.3\u00a01<br \/>\nWeb Topic Detection, Communication and Evolution, the 863 National High-Technology Project, 2007.9-2009.7<br \/>\nWeb Surveillance System for\u00a0\u00a0China Securities Regulatory Commission (CSRC) 2008.11-2009.6<\/p>\n<\/div>\n<h2><strong>\u79d1\u7814\u9879\u76ee\uff1a<\/strong><\/h2>\n<p><span class=\"fontstyle0\">\u57fa\u4e8e\u591a\u8bed\u77e5\u8bc6\u4e0e\u5c0f\u6837\u672c\u5b66\u4e60\u7684\u5c0f\u8bed\u79cd\u673a\u5668\u7ffb\u8bd1\u4e0e\u5185\u5bb9\u751f\u6210\u6280\u672f<\/span>\uff1b <span class=\"fontstyle0\">\u57fa\u7840\u52a0\u5f3a\u8ba1\u5212\u6280\u672f\u9886\u57df\u57fa\u91d1\uff082021-JCJQ-JJ-0059\uff09<\/span>; 2021.10-2024.10;200\u4e07\uff1b\u5728\u7814 \u5f20\u534e\u5e73<\/p>\n<p>\u914d\u7f6e\u5b89\u5168\uff1b\u521b\u65b0\u7279\u533a\u9879\u76ee; 2021.11-2023.11;300\u4e07\uff1b\u5728\u7814 \u5f20\u534e\u5e73<\/p>\n<p>\u57fa\u4e8e\u8bed\u8a00\u9884\u8bad\u7ec3\u6a21\u578b\u4e0e\u9886\u57df\u77e5\u8bc6\u7684\u4e2d\u6587\u6587\u672c\u878d\u5408\u6821\u5bf9\u7b97\u6cd5\u7814\u7a76\uff1b\u5317\u4eac\u5e02\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee(4212026); 2021.1-2024.12;20\u4e07\uff1b\u5728\u7814 \u5f20\u534e\u5e73<\/p>\n<p>\u6587\u672c\u751f\u6210\u9884\u7814\u8bfe\u9898\uff1b\u4e2d\u7535\u79d1; 2020.7-2021.12; 897\u4e07\uff1b\u5728\u7814 \u5f20\u534e\u5e73<\/p>\n<p><span style=\"font-size: inherit;\">\u914d\u7f6e\u5b89\u5168\u8bfe\u9898\uff1b\u67d0\u90e8; 2021.1-2022.12; 300\u4e07\uff1b\u5728\u7814 \u5f20\u534e\u5e73<\/span><\/p>\n<p>\u9762\u5411\u4e92\u8054\u7f51\u4fe1\u606f\u7684\u53f8\u6cd5\u8206\u60c5\u76d1\u6d4b\u4e0e\u5206\u7ea7\u9884\u8b66\u6280\u672f\u7814\u7a76\u53ca\u7cfb\u7edf\u7814\u53d1 2018YFC0832304 \u201c\u516c\u5171\u5b89\u5168\u98ce\u9669\u9632\u63a7\u4e0e\u5e94\u6025\u6280\u672f\u88c5\u5907\u201d\u91cd\u70b9\u4e13\u9879\uff08\u53f8\u6cd5\u4e13\u9898\u4efb\u52a1\uff09 121<br \/>\n\u7279\u5b9a\u884c\u4e1a\u4e92\u8054\u7f51\u6570\u636e\u5206\u6790\u670d\u52a1 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 99<br \/>\n\u8bed\u4e49\u4e3b\u9898\u4e0e\u793e\u4ea4\u5173\u7cfb\u878d\u5408\u7684\u7279\u5b9a\u7fa4\u4f53\u53d1\u73b0\u5173\u952e\u6280\u672f\u7814\u7a76 61772075 \u56fd\u5bb6\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee\u00a0 61<br \/>\n\u6587\u672c\u6316\u6398\u7b97\u5b50\u8fd0\u7ef4 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 28.8<br \/>\n\u7279\u5b9a\u7f51\u7edc\u670d\u52a1\u7684\u7528\u6237\u4e0e\u670d\u52a1\u5668\u7279\u5f81\u6a21\u578b\u7814\u7a76\u53ca\u8d8b\u52bf\u5206\u6790 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 100<br \/>\n\u6587\u672c\u6316\u6398\u7b97\u5b50\u8fd0\u7ef4 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 28.5<br \/>\n\u7279\u5b9a\u7f51\u7edc\u670d\u52a1\u7684\u7528\u6237\u4e0e\u670d\u52a1\u5668\u7279\u5f81\u6a21\u578b\u7814\u7a76\u53ca\u8d8b\u52bf\u5206\u6790 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 70<br \/>\n\u4e2d\u56fd\u4eba\u6c11\u94f6\u884c\u5f81\u4fe1\u4e2d\u5fc3\u4e92\u8054\u7f51\u516c\u5171\u4fe1\u606f\u81ea\u52a8\u6293\u53d6\u8bfe\u9898\u7814\u7a76\u670d\u52a1\u4e8c\u6b21\u91c7\u8d2d\u9879\u76ee \u4e2d\u56fd\u4eba\u6c11\u94f6\u884c\u5f81\u4fe1\u4e2d\u5fc3 32<br \/>\n\u9762\u5411**\u5206\u6790\u7684\u77e5\u8bc6\u5e93\u4e0e\u6570\u636e\u6807\u7b7e\u5e94\u7528\u7cfb\u7edf \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 60<br \/>\n\u6587\u672c\u6316\u6398\u5173\u952e\u6280\u672f* 2014A10 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 80<br \/>\n\u793e\u4ea4\u7f51\u7edc\u5206\u6790\u53ca\u4fe1\u606f\u4f20\u64ad\u7406\u8bba\u5728\u8206\u60c5\u9884\u8b66\u65b9\u9762\u7684\u793a\u8303\u9a8c\u8bc1 2013CB329606 \u56fd\u5bb6973\u91cd\u70b9\u57fa\u7840\u7814\u7a76\u53d1\u5c55\u8ba1\u5212 96<br \/>\n\u57fa\u4e8e\u4e3b\u4f53\u4e2a\u6027\u5316\u7684\u5fae\u535a\u60c5\u611f\u5206\u6790\u5173\u952e\u6280\u672f\u7814\u7a76 61272362 \u56fd\u5bb6\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee 84<br \/>\n\u4e92\u8054\u7f51\u5f00\u653e\u5e73\u53f0\u53ca\u5e94\u7528\u4fe1\u606f\u5b89\u5168**\u6280\u672f\u7814\u7a76\uff08\u6d89\u5bc6 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 60<br \/>\n\u65b0\u7586\u591a\u6c11\u65cf\u8bed\u8a00\u7f51\u7edc\u8206\u60c5\u76d1\u6d4b\u9884\u8b66\u7cfb\u7edf\u5f00\u53d1\u4e0e\u5e94\u7528 201212124 \u65b0\u7586\u81ea\u6cbb\u533a\u9ad8\u65b0\u6280\u672f\u8ba1\u5212 45<br \/>\n\u6d77\u91cf\u5f02\u6784\u4fe1\u606f\u5904\u7406\u5e73\u53f0\u5173\u952e\u6280\u672f\u7684\u7814\u53d1\u4e0e\u5e94\u7528 \u6cb3\u5317\u7701\u79d1\u6280\u652f\u6491\u8ba1\u5212 40<br \/>\n\u65b0\u6280\u672f\u65b0\u5e94\u7528\u53ca\u6218\u7565\u8ddf\u8e2a\u7814\u7a76\u2014\u4e91\u8ba1\u7b97 CNITSEC-KY-2011-012\/3 \u4e2d\u56fd\u4fe1\u606f\u5b89\u5168\u8bc4\u6d4b\u4e2d\u5fc3 25<br \/>\n\u5178\u578b\u5e94\u7528\u7cfb\u7edf\u6a21\u62df\u4eff\u771f\u4e0e\u9690\u60a3\u5206\u6790\u7814\u7a76\u2014\u4e91\u8ba1\u7b97 CNITSEC-KY-2011-013\/5 \u4e2d\u56fd\u4fe1\u606f\u5b89\u5168\u8bc4\u6d4b\u4e2d\u5fc3 30<br \/>\n\u91d1\u878d\u8206\u60c5\u591a\u7a7a\u5224\u522b\u5173\u952e\u6280\u672f\u7814\u7a76 20110742007 \u5317\u4eac\u7406\u5de5\u5927\u5b66\u57fa\u7840\u79d1\u7814\u57fa\u91d1 2<br \/>\n\u79d1\u6280\u9879\u76ee\u5e93\u6784\u5efa\u4e0e\u6316\u6398\u7cfb\u7edf \u4e2d\u56fd\u79d1\u5b66\u6280\u672f\u4fe1\u606f\u7814\u7a76\u6240 10<br \/>\n\u65b0\u6280\u672f\u65b0\u5e94\u7528\u5b89\u5168\u95ee\u9898\u6218\u7565\u5bf9\u7b56\u7814\u7a76-\u4e91\u8ba1\u7b97 CNITSEC-KY-0910-019\/6 \u4e2d\u56fd\u4fe1\u606f\u5b89\u5168\u8bc4\u6d4b\u4e2d\u5fc3 15<br \/>\n\u7f51\u7edc\u8bdd\u9898\u7684\u53d1\u73b0\u3001\u4f20\u64ad\u53ca\u52a8\u6001\u6f14\u5316\u7279\u5f81\u5206\u6790\u6280\u672f 2007AA01Z438 \u56fd\u5bb6863\u8ba1\u5212 93<br \/>\n\u57fa\u4e8e\u6d88\u606f\u7684\u70ed\u70b9\u53d1\u73b0\u4e0e\u4fe1\u606f\u8ffd\u8e2a* 2005C36 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 45<br \/>\n\u8f85\u52a9\u5206\u6790\u7cfb\u7edf* 2007A08 \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 50<br \/>\n\u9762\u5411\u70ed\u70b9\u8bdd\u9898\u53d1\u73b0\u7cfb\u7edf* \u5de5\u4fe1\u90e8 80<br \/>\n**\u7684\u8206\u60c5**\u7814\u7a76* \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 50<br \/>\n\u865a\u62df\u8ba1\u7b97\u73af\u5883\u4e0b\u7684\u7f51\u7edc\u8206\u60c5\u81ea\u9002\u5e94\u7cfb\u7edf\u7814\u7a76* \u56fd\u5bb6242\u4fe1\u606f\u5b89\u5168\u8ba1\u5212 70<br \/>\n\u9762\u5411\u4e92\u8054\u7f51\u7684\u53d1\u73b0\u7cfb\u7edf* YHX \u5de5\u4fe1\u90e8 392.7<br \/>\n\u4e2d\u56fd\u8bc1\u76d1\u4f1a\u7f51\u7edc\u4fe1\u606f\u76d1\u63a7\u7cfb\u7edf CSRC200803 \u4e2d\u56fd\u8bc1\u76d1\u4f1a 136.5<br \/>\n\u793e\u4f1a\u8206\u60c5\u5206\u6790\u673a\u5236\u7814\u7a76 2006\u6240\u77e5\u8bc6\u521b\u65b0\u57fa\u91d1 35<br \/>\n\u9762\u5411\u8bc1\u5238\u5e02\u573a\u7684\u8206\u60c5\u52a8\u6001\u5206\u6790 \u4f18\u79c0\u535a\u58eb\u5b66\u4f4d\u8bba\u6587\u3001\u9662\u957f\u5956\u83b7\u5f97\u8005\u79d1\u7814\u542f\u52a8\u4e13\u9879\u8d44\u91d1 10<br \/>\n\u4e0a\u5e02\u516c\u53f8\u5546\u60c5\u6316\u6398\u7cfb\u7edf\u5f00\u53d1\u5e94\u7528 2007\u8ba1\u7b97\u6240\u6240\u77e5\u8bc6\u521b\u65b0\u57fa\u91d1\u767e\u661f\u8ba1\u5212 10<br \/>\n\u9762\u5411\u4e2d\u6587\u641c\u7d22\u5f15\u64ce\u7684\u7d22\u5f15\u8bcd\u5206\u6790\u6280\u672f 2005\u6240\u77e5\u8bc6\u521b\u65b0\u57fa\u91d1 15<br \/>\n\u57fa\u4e8e\u4e2d\u56fd\u79fb\u52a8\u4e91\u8ba1\u7b97\u5e73\u53f0\u7684\u4e92\u8054\u7f51\u6587\u672c\u4fe1\u606f\u641c\u7d22\u5f15\u64ce\u7cfb\u7edf \u4e2d\u56fd\u79fb\u52a8\u7814\u7a76\u9662 62<\/p>\n<h2><strong>\u53d1\u8868\u7684\u8bba\u6587\u4e13\u8457\u5217\u8868<\/strong><\/h2>\n<p><strong>\u4e13\u8457\u5217\u8868<\/strong><br \/>\n\u5f20\u534e\u5e73,\u5546\u5efa\u4e91\uff0c\u90ed\u6d9b\uff0c\u5218\u5146\u53cb;\u5927\u6570\u636e\u667a\u80fd\uff0c\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e,2019.1<br \/>\n\u5f20\u534e\u5e73,\u5546\u5efa\u4e91\uff0c\u767d\u7855\uff0c\u6bb5\u6c38\u671d\u7b49\u8457 \u5927\u6570\u636e\u5927\u5bb6\u8c08\uff082017.1\uff09,\u7535\u5b50\u5de5\u4e1a\u51fa\u7248\u793e\uff08ISBN:978-7-121-30181-0\uff09<br \/>\n\u5f20\u534e\u5e73,\u9ad8\u51ef\uff0c\u9ec4\u6cb3\u71d5,\u8d75\u71d5\u5e73.\u5927\u6570\u636e\u641c\u7d22\u4e0e\u6316\u6398.\u79d1\u5b66\u51fa\u7248\u793e.2014.5\uff08ISBN:978-7-03-040318-6\uff09<br \/>\n\u5f20\u534e\u5e73\uff0c\u674e\u6052\u8bad,\u5218\u6cbb\u534e.\u4fe1\u606f\u68c0\u7d22\u7b97\u6cd5\u4e0e\u63a2\u7d22\u6cd5\uff0c\u4eba\u6c11\u90ae\u7535\u51fa\u7248\u793e\uff0c 2010\u5e749\u6708\uff08ISBN:978-7-115-23575-6\uff09<br \/>\n\u5218\u7fa4,\u5f20\u534e\u5e73,\u9a86\u536b\u534e,\u5b59\u5065\uff0c\u81ea\u7136\u8bed\u8a00\u7406\u89e3, \u7535\u5b50\u5de5\u4e1a\u51fa\u7248\u793e, 2005\u5e741\u6708(ISBN\uff1a7-121-00755-X)<\/p>\n<p><strong>\u8bba\u6587\u5217\u8868<\/strong><\/p>\n<p>Linfang Wu, Hua-Ping Zhang, Yaofei Yang and Kai Gao. Dynamic Prototype Selection by Fusing Attention Mechanism for Few Shot Relation Classification. ACIIDS.<br \/>\nYaofei Yang, Hua-Ping Zhang, Linfang Wu and Yangsen Zhang. Cached Embedding with Random Selection: Optimization Technique to Improve Training Speed of Character-Aware Embedding. ACIIDS.<\/p>\n<p>&#8220;Xi Zhang, Hua-Ping Zhang, Lei Zhao:<br \/>\nReading More Efficiently: Multi-sentence Summarization with a Dual Attention and Copy-Generator Network. In: The Pacific Rim International Conferences on Artificial Intelligence, PRICAI 2018, Nanjing, Jiangsu, China, 28-31 August 2018, (1) 2018: 811-823&#8221;<br \/>\nShen Gao, Huaping Zhang, Kai Gao. A Convolutional Neural Network Based Sentiment Classification and the Convolutional Kernel Representation[C]. Proceedings of 22nd International Conference on Natural Language &amp; Information Systems(NLDB), Springer LNCS, Li\u00e8ge, Belgium, 21-23 June, 2017, EI Compendex index<br \/>\nShen Gao, Huaping Zhang, Kai Gao. Text Understanding with a Hybrid Neural Network Based Learning[C]. Proceedings of the 3th International Conference of Pioneering Computer Scientists, Engineers and Educators (ICPCSEE), Springer LNCS, Changsha, China, 22-24 September, 2017, EI Compendex index.<br \/>\nSongZe Wu, Huaping Zhang, Chengcheng Xu, Tao Guo. Text Clustering on Short Message by Using Deep Semantic Representation. International Conference on Computational Sciences, Advanced Database and Computing, 2017.<br \/>\n&#8220;CHENGCHENG XU, HUAPING ZHANG, BINGBING LU AND SONGZE WU. Local<br \/>\nCommunity Detection Using Social Relations and Topic Features in Social Networks<br \/>\n[M]. Chinese Computational Linguistics and Natural Language Processing Based on<br \/>\nNaturally Annotated Big Data. Springer, Cham, 2017, 371-383.&#8221;<br \/>\n&#8220;BINGBING LU, HUAPING ZHANG, BIN LIU AND ZHONGHUA ZHAO. Research on<br \/>\nUser Identification Algorithm Based on Massive Multi-site VPN Log [C]. IEEE, International Conference on Communication Technology. IEEE, 2017:1372-1381&#8221;<br \/>\n\u5f20\u534e\u5e73\uff0c\u5546\u5efa\u4e91.\u9762\u5411\u793e\u4f1a\u5a92\u4f53\u7684\u5f00\u653e\u9886\u57df\u65b0\u8bcd\u53d1\u73b0.\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5.\u7b2c31\u5377\u7b2c3\u671f\uff0c115-121. 2017\u5e745\u6708<br \/>\n\u5f20\u534e\u5e73\uff0c\u674e\u6052\u8bad\uff0c\u674e\u6e05\u654f. \u60c5\u611f\u8bcd\u53d1\u73b0\u4e0e\u6781\u6027\u6743\u91cd\u81ea\u52a8\u8ba1\u7b97\u7b97\u6cd5\u7814\u7a76.\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5.\u7b2c31\u5377\u7b2c3\u671f\uff0c60-66. 2017\u5e745\u6708<br \/>\nA Convolutional Neural Network Based Sentiment Classification and the Convolutional Kernel Representation The 22nd International Conference on Natural Language and Information Systems Gao Shen, Zhang Huaping*, Gao Kai<br \/>\nNews Abridgement Algorithm Based on Word Alignment and Syntactic Parsing[M]\/\/ Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data. 2016. Yu Min,Zhang Huaping,Zhang Yu<br \/>\nQiao Y, Zhang Huaping, Yu M, et al. Sina-Weibo Spammer Detection with GBDT [M]\/\/ Social Media Processing. Springer Singapore, 2016. EI<br \/>\nZhang Y, Yu M, He Y, et al. Events Influence Computation on Social Media [C]\/\/ International Conference on Electronics Network and Computer Engineering, 2016.<br \/>\nYang Qiao,Huaping Zhang*\uff08\u5f20\u534e\u5e73\uff09,.Effective Detecting Microblog Spammers Using Big Data Fusion Algorithm.WorldComp&#8217;16,July 25-28,Las Vegas,Nevada,USA<br \/>\n[3] Jiandong Zhou(\u5468\u5efa\u680b\uff09, Yanping Zhao\uff08\u8d75\u71d5\u5e73\uff09, Huaping Zhang*\uff08\u5f20\u534e\u5e73\uff09. Measuring Emotion Bifurcation Points for Individuals in Social Media[C].the Hawaii International Conference on System Science(\u56fd\u9645\u7cfb\u7edf\u79d1\u5b66\u5e74\u4f1a HICSS&#8217;49\uff0c\u7ba1\u7406A\u7c7b\u4f1a\u8bae, EI\u68c0\u7d22), Jan.5-8, 2016, Honolulu, KAUAI, Hawaii USA.2016:1949-1958.<br \/>\n&#8220;\u674e\u7136,\u5f20\u534e\u5e73,\u8d75\u71d5\u5e73\uff0c\u5546\u5efa\u4e91.\u57fa\u4e8e\u4e3b\u9898\u6a21\u578b\u4e0e\u4fe1\u606f\u71b5\u7684\u4e2d\u6587\u6587\u6863\u81ea\u52a8\u6458\u8981\u6280\u672f\u7814\u7a76(Automatic Text Summarization Research Based on Topic Model and Information Entropy).\u8ba1\u7b97\u673a\u79d1\u5b66.2014-11<br \/>\n&#8221; \u7b2c41\u5377\u7b2c11A\u671f \u6742\u5fd7<br \/>\nMengshu Sun,Huaping Zhang;Yanping Zhao;Jianyun Shang;Baojun Ma;From Posts to Values: Mining Schwartz Values of Individuals from Social Media;Volume 489 of the series Communications in Computer and Information Science pp 206-219 SCI \u6742\u5fd7<br \/>\n\u8d75\u8fde\u4f1f\uff0c\u5f20\u534e\u5e73\uff0c\u53f2\u5b66\u6587.\u6587\u672c\u5206\u7c7b\u5b57\u8bcd\u7279\u5f81\u5bf9\u6bd4\u7814\u7a76[J]\uff0c\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5\uff0c2016.\uff08\u6838\u5fc3\u671f\u520a\uff09 \u4f1a\u8bae\/\u6742\u5fd7<br \/>\n\u5f20\u534e\u5e73,\u674e\u6e05\u654f,\u4e8e\u654f.\u60c5\u611f\u8bcd\u53d1\u73b0\u4e0e\u6781\u6027\u6743\u91cd\u81ea\u52a8\u8ba1\u7b97\u7b97\u6cd5\u7814\u7a76.\u7b2c\u4e09\u5c4a\u5168\u56fd\u793e\u4f1a\u5a92\u4f53\u5904\u7406\u5927\u4f1a(\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5\u63a5\u6536).2014\u5e7411\u6708.\u5317\u4eac \u4f1a\u8bae\/\u6742\u5fd7<br \/>\n\u674e\u857e\uff0c\u5f20\u534e\u5e73\uff0c\u8d75\u71d5\u5e73.\u57fa\u4e8e\u8bed\u4e49\u4e0e\u5173\u7cfb\u7684\u793e\u4ea4\u7f51\u7edc\u7fa4\u4f53\u53d1\u73b0\u8fed\u4ee3\u7b97\u6cd5.\u7b2c\u4e09\u5c4a\u5168\u56fd\u793e\u4f1a\u5a92\u4f53\u5904\u7406\u5927\u4f1a.2014\u5e7411\u6708.\u5317\u4eac \u4f1a\u8bae<br \/>\n\u9648\u6653\u9633\uff0c\u5f20\u534e\u5e73\uff0c\u8d75\u71d5\u5e73\uff0c\u5546\u5efa\u4e91.\u9762\u5411\u793e\u4f1a\u5a92\u4f53\u7684\u5f00\u653e\u9886\u57df\u65b0\u8bcd\u53d1\u73b0.\u7b2c\u4e09\u5c4a\u5168\u56fd\u793e\u4f1a\u5a92\u4f53\u5904\u7406\u5927\u4f1a(\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5\u63a5\u6536).2014\u5e7411\u6708.\u5317\u4eac \u4f1a\u8bae\/\u6742\u5fd7<br \/>\nChen Xiao-Yang, Shang Jian-Yun, Zhao Yan-Ping, Shi Xue-Wen. A Comparison of Part-Of-Speech Tag Sets for Transition-based Dependency Parsing[C]. 2014 the Second International Conference on Information Technology and Computer Application Engineering EI\u7d22\u5f15 \u4f1a\u8bae<br \/>\n\u5f20\u534e\u5e73,\u5b59\u68a6\u59dd,\u5f20\u745e\u7426,\u674e\u857e.\u5fae\u535a\u535a\u4e3b\u7684\u7279\u5f81\u4e0e\u884c\u4e3a\u5927\u6570\u636e\u6316\u6398.\u4e2d\u56fd\u8ba1\u7b97\u673a\u5b66\u4f1a\u901a\u8baf.2014.6.p36-p43 \u6742\u5fd7<br \/>\nHuaping Zhang,Ruiqi Zhang,Yanping Zhao,Baojun Ma;Big Data Modeling and Analysis of Microblog Ecosystem;International Journal of Automation and Computing,2014.11(2) p119-127 EI(14213495) \u6742\u5fd7<br \/>\nBaojun Ma, Huaping Zhang, Guoqing Chen, Yanping Zhao, Bart Baesens. Investigating Associative Classification for Software Fault Prediction: An Experimental Perspective. International Journal of Software Engineering and Knowledge Engineering, 2014, 24(1): 61-90.(SCI\/EI) SCI \u6742\u5fd7<br \/>\nKai Gao*, Hua-ping Zhang, Sheng-wang Li, Wei Wang, Jing Qiu;Research on Classification Algorithm and its Application in Cased-Based Reasoning,Int. J. Computer Applications in Technology,2013 vol.48,p373-381<br \/>\n\u5f20\u534e\u5e73,\u4ee5\u4e3b\u4f53\u4e3a\u4e2d\u5fc3\u7684\u5fae\u535a\u8ba1\u7b97\u65b9\u6cd5,\u590d\u6742\u7cfb\u7edf\u4e0e\u590d\u6742\u6027\u79d1\u5b66,2012\u5e74\u7b2c\u56db\u671f p84-91<br \/>\n\u5f20\u534e\u5e73,\u674e\u7b11\u4f83.\u57fa\u4e8e\u5168\u751f\u547d\u5468\u671f\u7684\u4e91\u8ba1\u7b97\u5b89\u5168\u9690\u60a3\u5206\u6790\u6a21\u578b,\u7b2c\u56db\u5c4a\u5168\u56fd\u4fe1\u606f\u5b89\u5168\u6f0f\u6d1e\u5206\u6790\u4e0e\u98ce\u9669\u8bc4\u4f30\u5927\u4f1a\uff08VARA 2011\uff09<br \/>\n\u5f20\u534e\u5e73,\u738b\u6653\u5189.\u4e2d\u7f8e\u4e91\u8ba1\u7b97\u53d1\u5c55\u6218\u7565\u5bf9\u6bd4\u5206\u6790,\u7b2c\u56db\u5c4a\u5168\u56fd\u4fe1\u606f\u5b89\u5168\u6f0f\u6d1e\u5206\u6790\u4e0e\u98ce\u9669\u8bc4\u4f30\u5927\u4f1a\uff08VARA 2011\uff09<br \/>\n\u5f20\u534e\u5e73,\u8d75\u71d5\u5e73\uff0c\u8d75\u8f89\uff0c\u5f6d\u6d01.\u63d0\u4f9b\u77e5\u8bc6\u5173\u8054\u52a8\u6001\u7684\u79d1\u6280\u9879\u76ee\u5e93\u7ba1\u7406,\u7b2c\u516d\u5c4a\u79d1\u6280\u4fe1\u606f\u8d44\u6e90\u5171\u4eab\u4fc3\u8fdb\u56fd\u9645\u4f1a\u8bae\uff08COINFO\u201911\uff09<br \/>\nHua-Ping Zhang,Huan-Ping Wu,Jian Gao,Yan-Ping Zhao,Zhong-Liang Lv,Meteorological Bulletin Automatic Generation based on Spatio-Temporal Reasoning,In Proceedings of 2011 International Conference on Machine Learning and Cybernetics in Guangxi, China,2011.7\uff0cp1927-1931 EI \u56fd\u9645\u4f1a\u8bae<br \/>\nHua-Ping Zhang, Qian Mo,He-Yang Huang,Structured POI data Extraction from Internet News,In Proceedings of the 4th International Universal Communication Symposium (IUCS 2010) in Beijing, China,2010.10\uff0cp115-120(\u7279\u9080\u62a5\u544a) EI \u56fd\u9645\u4f1a\u8bae<br \/>\nHua-Ping ZHANG,Jian GAO,Qian MO,He-Yan HUANG.Incorporating New Words Detection with Chinese Word Segmentation.In Proceedings of CIPS-SIGHAN Joint Conference on Chinese Language Processing (CLP 2010).Beijing, China.2010.8 .p249-251. \u56fd\u9645\u4f1a\u8bae<br \/>\nHua-Ping ZHANG,Zhi-Hua LIU,Qian MO,He-Yan HUANG.Chinese Personal Name Disambiguation Based on Person Modeling.In Proceedings of CIPS-SIGHAN Joint Conference on Chinese Language Processing (CLP 2010).Beijing, China.2010.8 .p374-378 \u56fd\u9645\u4f1a\u8bae<br \/>\n\u6731\u6d77\u9f99,\u5f20\u534e\u5e73\uff0c\u848b\u9a88.\u9762\u5411\u7f51\u7ad9\u7684\u81ea\u52a8\u5bfc\u822a\u7cfb\u7edf\u7684\u8bbe\u8ba1\u4e0e\u5b9e\u73b0.\u4e2d\u56fd\u65b0\u901a\u4fe1.2010\u5e74\u7b2c6\u671f.p76-80 \u671f\u520a<br \/>\n\u79e6\u9e4f,\u5f20\u534e\u5e73,\u5218\u91d1\u521a. \u57fa\u4e8e\u65b0\u8bcd\u53d1\u73b0\u6280\u672f\u7684\u5173\u952e\u8bcd\u63d0\u53d6\u7b97\u6cd5\u7814\u7a76.\u5fae\u8ba1\u7b97\u673a\u4fe1\u606f EI \u6838\u5fc3\u671f\u520a<br \/>\n\u674e\u6052\u8bad\uff0c\u5f20\u534e\u5e73,\u5218\u91d1\u521a\uff0eWWW\u8bba\u575b\u91c7\u96c6\u5173\u952e\u6280\u672f\u7814\u7a76\uff3bJ\uff3d\uff0e\u5fae\u8ba1\u7b97\u673a\u4fe1\u606f\uff0e2010\uff0c8-3\uff1a106-107 EI \u6838\u5fc3\u671f\u520a<br \/>\n\u5f20\u4eac\u9633, \u5f20\u534e\u5e73, \u5218\u91d1\u521a.\u57fa\u4e8e\u805a\u56e2\u8bcd\u7684\u5927\u89c4\u6a21\u6587\u672c\u8f6c\u8f7d\u8bc6\u522b\u7b97\u6cd5[J]. \u8ba1\u7b97\u673a\u5e94\u7528, 2010, 30(6):224-227 EI \u6838\u5fc3\u671f\u520a<br \/>\n\u79e6\u9e4f\uff0c\u5f20\u534e\u5e73,\u57fa\u4e8e\u5173\u952e\u8bcd\u63d0\u53d6\u7684\u68c0\u7d22\u7ed3\u679c\u805a\u7c7b\u7814\u7a76\uff0c\u7b2c\u4e94\u5c4a\u5168\u56fd\u4fe1\u606f\u68c0\u7d22\u5b66\u672f\u4f1a\u8bae(CCIR2009), \u4e0a\u6d77\uff0c2009-11<br \/>\n\u674e\u6052\u8bad,\u5f20\u534e\u5e73,\u57fa\u4e8e\u4e3b\u9898\u8bcd\u7684\u7f51\u7edc\u70ed\u70b9\u8bdd\u9898\u53d1\u73b0\uff0c\u7b2c\u4e94\u5c4a\u5168\u56fd\u4fe1\u606f\u68c0\u7d22\u5b66\u672f\u4f1a\u8bae(CCIR2009), \u4e0a\u6d77\uff0c2009-11<br \/>\n\u9f9a\u624d\u6625\u3001\u5f20\u534e\u5e73\u3001\u8bb8\u6d2a\u6ce2\u3001\u7a0b\u5b66\u65d7\u3001\u767d\u7855\uff0c\u4e2d\u6587\u77ed\u6587\u672c\u6d41\u7684\u5feb\u901f\u7f16\u7801\u8bc6\u522b\u7b97\u6cd5.In Proceedings of the 7th International Conference of Chinese Computing\uff0c2007<br \/>\n\u738b\u601d\u529b\uff0c\u5f20\u534e\u5e73\uff0c\u738b\u658c\uff0c\u53cc\u6570\u7ec4Trie\u6811\u7b97\u6cd5\u4f18\u5316\u53ca\u5176\u5e94\u7528\u7814\u7a76\uff0c\u300a\u4e2d\u6587\u4fe1\u606f\u5b66\u62a5\u300b\uff0c2006 Vol. 20, No. 5: 24-30<br \/>\n\u8d3a\u654f,\u5f20\u534e\u5e73,\u7a0b\u5b66\u65d7. \u57fa\u4e8e\u8d1d\u53f6\u65af\u5206\u7c7b\u7684\u6c49\u5b57\u7f16\u7801\u8bc6\u522b\u65b9\u6cd5. \u7b2c\u4e5d\u5c4a\u201c\u8ba1\u7b97\u673a\u79d1\u5b66\u4e0e\u6280\u672f\u201d\u7814\u7a76\u751f\u5b66\u672f\u7814\u8ba8\u4f1a,2006.7.<br \/>\n\u8d3a\u654f,\u9f9a\u624d\u6625,\u5f20\u534e\u5e73,\u7a0b\u5b66\u65d7. \u4e00\u79cd\u57fa\u4e8e\u5927\u89c4\u6a21\u8bed\u6599\u7684\u65b0\u8bcd\u53d1\u73b0\u65b9\u6cd5.\u8ba1\u7b97\u673a\u5de5\u7a0b\u4e0e\u5e94\u7528,2007\u7b2c27\u671f.3.<br \/>\n\u8d3a\u654f,\u5f20\u534e\u5e73,\u9f9a\u624d\u6625,\u7a0b\u5b66\u65d7 \u4e00\u79cd\u57fa\u4e8e\u53cc\u5b57\u8026\u5408\u5ea6\u7684\u672a\u767b\u5f55\u8bcd\u8bc6\u522b\u7b97\u6cd5..2007\u5168\u56fd\u7f51\u7edc\u4e0e\u4fe1\u606f\u5b89\u5168\u6280\u672f\u7814\u8ba8.<br \/>\n\u4fde\u9e3f\u9b41,\u5f20\u534e\u5e73,\u5218\u7fa4, \u5415\u5b66\u5f3a\uff0c\u65bd\u6c34\u624d. \u57fa\u4e8e\u5c42\u53e0\u9690\u9a6c\u5c14\u53ef\u592b\u6a21\u578b\u7684\u4e2d\u6587\u547d\u540d\u5b9e\u4f53\u8bc6\u522b, \u901a\u4fe1\u5b66\u62a5, 2006?27(2)?:87-94<br \/>\n&#8221; Hua-Ping ZHANG, Jian Sun, Bin WANG, Shuo BAI. Computation on Sentence Semantic Distance for Novelty Detection; Chinese Journal of Computer Science and Tech. vol.3, 2005 DOI: 10.1007\/s11390-005-0331-7<br \/>\n\u88ab\u5f15\u9891\u6b21: 5 (\u6765\u81ea\u6240\u6709\u6570\u636e\u5e93) &#8221;<br \/>\nHua-Ping Zhang, Hong-Bo Xu, Shuo Bai, Bin Wang, Xue-Qi Cheng. Experiments in TREC 2004 Novelty Track at CAS-ICT. In Proc. of the 13th Text Retrieval Conference, Gaithersburg, Maryland, November, 2004, pp287<br \/>\n\u5f20\u534e\u5e73,\u5218\u7fa4. \u57fa\u4e8e\u89d2\u8272\u6807\u6ce8\u7684\u4e2d\u56fd\u4eba\u540d\u81ea\u52a8\u8bc6\u522b\u7814\u7a76. \u8ba1\u7b97\u673a\u5b66\u62a5, vol.27, No.1, 2004, pp.85-91<br \/>\n\u5218\u7fa4,\u5f20\u534e\u5e73,\u4fde\u9e3f\u9b41,\u7a0b\u5b66\u65d7. \u57fa\u4e8e\u5c42\u53e0\u9690\u9a6c\u6a21\u578b\u7684\u6c49\u8bed\u8bcd\u6cd5\u5206\u6790; \u8ba1\u7b97\u673a\u7814\u7a76\u4e0e\u53d1\u5c55, 41\u5377, No.8, 2004, pp.1421-pp.1429<br \/>\nHua-Ping ZHANG, Qun LIU, Hong-Kui YU, Xue-Qi CHENG, Shuo BAI. Chinese Name Entity Recognition Using Role Model. Special issue &#8220;Word Formation and Chinese Language processing&#8221; of the International Journal of Computational Linguistics and Chinese Language Processing, vol.8, No.2, 2003, pp. 29-602<br \/>\nHua-Ping ZHANG, Qun LIU, Xue-Qi CHENG, Hao Zhang, Hong-Kui Yu. Chinese Lexical Analysis Using Hierarchical Hidden Markov Model, Second SIGHAN workshop affiliated with 41st ACL; Sapporo Japan, July, 2003, pp. 63-70<br \/>\nHua-Ping ZHANG, Hong-Kui Yu, De-Yi Xiong, Qun LIU. HHMM-based Chinese Lexical Analyzer ICTCLAS, Second SIGHAN workshop affiliated with 41th ACL; Sapporo Japan, July, 2003, pp. 184-187<br \/>\nKevin Zhang (Hua-Ping Zhang), Qun Liu, Hao Zhang, Xueqi Cheng. Automatic Recognition of Chinese Unknown Words Based on Role Tagging, First SIGHAN affiliated with 19th COLING, September 2002, pp71-77<br \/>\n\u5f20\u534e\u5e73,\u5218\u7fa4.\u57fa\u4e8eN-\u6700\u77ed\u8def\u5f84\u7684\u4e2d\u6587\u8bcd\u8bed\u7c97\u5206\u6a21\u578b. \u4e2d\u6587\u4fe1\u606f\u5b66\u62a5. 2002.9, Vol.16(5):pp.1-pp.7;<br \/>\n\u5f20\u534e\u5e73,\u5218\u7fa4. \u57fa\u4e8e\u89d2\u8272\u6807\u6ce8\u7684\u4e2d\u56fd\u4eba\u540d\u81ea\u52a8\u8bc6\u522b\u7814\u7a76. \u7b2c\u4e03\u5c4a\u4e2d\u56fd\u79d1\u5b66\u9662\u8ba1\u7b97\u673a\u4e13\u4e1a\u7814\u7a76\u751f\u5b66\u672f\u4f1a\u8bae, 2002.7, \u56db\u5ddd\u5e7f\u5143<br \/>\nJian Sun, Wenfeng Pan, Hua-ping Zhang. TREC 2003 Novelty and Web Track at ICT, In Proc. of the Twelfth Text Retrieval Conference, Gaithersburg, Maryland, November 18-21, 2003, pp.138<br \/>\n\u4fde\u9e3f\u9b41,\u5f20\u534e\u5e73,\u5218\u7fa4. \u57fa\u4e8e\u89d2\u8272\u6807\u6ce8\u7684\u4e2d\u6587\u673a\u6784\u540d\u8bc6\u522b, Proc. of 20th International Conference on Computer Processing of Oriental Languages, 2003\u5e748\u6708, pp79-87, \u4e2d\u56fd\uff0c\u6c88\u9633<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Projects\uff1a Research on Machine T &hellip; <a href=\"http:\/\/www.nlpir.org\/wordpress\/2018\/09\/07\/__trashed\/\">\u7ee7\u7eed\u9605\u8bfb <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":581982,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"_links":{"self":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/1201"}],"collection":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/comments?post=1201"}],"version-history":[{"count":13,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/1201\/revisions"}],"predecessor-version":[{"id":581984,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/1201\/revisions\/581984"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/media\/581982"}],"wp:attachment":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/media?parent=1201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/categories?post=1201"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/tags?post=1201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}