共 23 条
[1]
Abirami MA., 2018, Data Mining and Knowledge Engineering, V10, P85
[2]
Bojanowski P., 2017, T ASSOC COMPUT LING, V5, P135, DOI [DOI 10.1162/TACL_A_00051, DOI 10.1162/TACLA00051, 10.1162/tacla00051]
[3]
Chung J., 2019, P 57 ANN M ASS COMP, P110
[5]
Duan X., 2018, Journal of Service Science and Management, V11, P267, DOI [10.4236/jssm.2018.112019, DOI 10.4236/JSSM.2018.112019]
[6]
He RD, 2019, 57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), P504
[7]
Hu MH, 2019, 57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), P537
[8]
Internet Software and Service Companies, 2017, The Arc of North Carolina protects privacy with Zix email encryption