| [1] |
ZHU Xiping, GAO Ang, XIAO Lijuan.
Named entity recognition of crop diseases and pests fusing dual dictionary
[J]. Computer Engineering & Science, 2025, 47(04): 718-727.
|
| [2] |
LIU Xiao-hua, XU Ru-zhi, YANG Cheng-yue.
A Chinese named entity recognition model based on multi-feature fusion embedding#br#
[J]. Computer Engineering & Science, 2024, 46(08): 1473-1481.
|
| [3] |
TIAN Hong-peng, WU Jing-wei.
RIB-NER:A span-based Chinese named entity recognition model
[J]. Computer Engineering & Science, 2024, 46(07): 1311-1320.
|
| [4] |
DING Jian-ping, LI Wei-jun, LIU Xue-yang, CHEN Xu.
A review of named entity recognition research
[J]. Computer Engineering & Science, 2024, 46(07): 1296-1310.
|
| [5] |
YU Jin-ping, ZHU Wei-feng, LIAO Lie-fa.
Entity recognition of support policy text based on RoBERTa-wwm-BiLSTM-CRF
[J]. Computer Engineering & Science, 2023, 45(08): 1498-1507.
|
| [6] |
XU Li, LI Jian-hua.
Biomedical named entity recognition based on BERT and BiLSTM-CRF
[J]. Computer Engineering & Science, 2021, 43(10): 1873-1879.
|
| [7] |
LI Hong-fei, LIU Pan-yu, WEI Yong.
Military named entity recognition based on self-attention and Lattice-LSTM
[J]. Computer Engineering & Science, 2021, 43(10): 1848-1855.
|
| [8] |
QIU Zeng-hui, HE Ming-jie, LIN Zheng-kui.
A named entity recognition method for online shopping comments based on deep learning
[J]. Computer Engineering & Science, 2020, 42(12): 2287-2294.
|
| [9] |
ZHOU Kang,WAN Liang,DING Hong-wei.
A cross-site script detection method
based on MLP-HMM
[J]. Computer Engineering & Science, 2019, 41(08): 1413-1420.
|
| [10] |
XIAO Xinfeng1,2,LI Shijun2,YU Wei2,LIU Jie2,LIU Beixiong1.
English-Chinese translation based on
an improved seq2seq model
[J]. Computer Engineering & Science, 2019, 41(07): 1257-1265.
|
| [11] |
LI Jianlong,WANG Panqing,HAN Qiyu.
Military named entity recognition based on bidirectional LSTM
[J]. Computer Engineering & Science, 2019, 41(04): 711-718.
|
| [12] |
HU Yuan1,XIA Li-min1,WANG Jia1,2.
Abnormal pedestrian behavior recognition
based on trajectory analysis
[J]. Computer Engineering & Science, 2017, 39(11): 2054-2059.
|
| [13] |
CHEN Yongyan,DAI Wei.
HMM risk assessment model on the exploitation levels
[J]. J4, 2014, 36(09): 1690-1696.
|
| [14] |
.
[J]. J4, 2007, 29(11): 152-156.
|