References

IDENTIFICATION METHOD OF CHARACTER TRAITS BASED ON WECHAT DATA


[1] Q. F. Cai, J. F. Guo, S. H. Yi, etc., Fund Managers’ WeChat Behavior, IPO Underpricing, and Earnings Volatility (May 5, 2015). Available at SSRN:

http://ssrn.com/abstract=2607045

[2] L. L. Wu and X. J. Yang, Research on the services of university mobile library based on the Wechat public platform, Research on Library Science 61(51) (2013), 18-57.

[3] C. F. Ji and Z. F. Zhou, Problems and countermeasures of the WeChat public platforms applied in Project 211 University Libraries, Research on Library Science 17 (2014), 38-41.

[4] J. H. Xiao and L. H. Huang, Research on information service mode of the library based on WeChat, Journal of Modern Information 33(6) (2013), 55-57.

[5] H. Tong, Research on WeChat according to communication study and its influence, Chongqing Social Sciences 09 (2013), 61-66.

[6] D. H. Kuang, J. Q. Hao and L. X. Ke, The subject service marketing based on WeChat, Library Work and Study 09 (2014), 123-125.

[7] W. He and K. Liang, New Weapons of Ideological and Political Education in Universities – WeChat, SHS Web of Conferences, IFSRAP 2013 – The First International Forum on Studies of Rural Areas and Peasants.

http://dx.doi.org/10.1051/shsconf/20140604001

[8] H. L. Che and C. Yang, Examining WeChat users’ motivations, trust, attitudes, and positive word-of-mouth: Evidence from China, Computers in Human Behavior 41 (2014), 104-111.

[9] K. Zhang, Mining data from Weibo to WeChat: A comparative case study of MOOC communities on social media in China, International Journal on E-Learning 14(3) (2015), 305-329.

[10] Y. T. Huang, X. Z. Lai, B. P. Dai, etc., Web-of-Things Framework for WeChat, Internet of Things, 2013 I (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (2013), 1496-1500.

[11] S. H. Hua and H. Wei, Study on knowledge propagation in complex networks based on preferences, Taking WeChat as example, Abstract and Applied Analysis 2014 (2014), 543734.

http://dx.doi.org/10.1155/2014/543734

[12] H. Xia, Q. Wei and S. Y. Zhang, Research on Undergraduates Perception of WeChat Acceptance, in e-Business Engineering (ICEBE), 2014 IEEE 11th International Conference on, pp. 61-67, 5-7 Nov. 2014.

[13] L. M. Huang, Q. Y. Zhu, J. Ding etc., Design and realization of technology intelligence push based on WeChat, Applied Mechanics and Materials 631-632 (2014), 1119-1122.

[14] D. L. Song, Y. J. Wang and F. You, Study on WeChat User Behaviors of University Graduates, Digital Home (ICDH), 2014 5th International Conference on, pp. 353-360, 28-30 Nov. 2014.

[15] Z. W. Liu, A study on the application of WeChat in ESP training, Theory and Practice in Language Studies 4(12) (2014), 2549-2554.

[16] L. Yi, Introduction to the WeChat Marketing Advantages and Development Prospects, Bachelor’s degree (UAS), Finland: Savonia-ammattikorkeakoulu.

http://www.theseus.fi/handle/10024/76332

[17] F. Gao and Y. Zhang, Analysis of WeChat on IPhone, 2nd International Symposium on Computer, Communication, Control and Automation (3CA 2013), 278-281.

[18] J. H. Xua, K. G. Qi, Z. Q. Song and Christopher Peter Clarke, Applications of mobile social media: WeChat among academic libraries in China, The Journal of Academic Librarianship 41(1) (2015), 21-30.

[19] C. Q. Wang, Research on mobile information service of the library based on WeChat, Applied Mechanics and Materials 701-702 (2014), 1008-1012.

[20] J. W. Han, M. Kamber and J. Pei, Data Mining Concepts and Techniques, Third Edition, Beijing: China Machine Press, 2012.

[21] M. McCord and M. Chuah, Spam Detection on Twitter using Traditional Classifiers, Proceedings of the 8th International Conference on Autonomic and Trusted Computing, Piscataway, USA: IEEE Press, (2011), 175-186.

[22] M. Hall, E. Frank, G. Holmes etc., The WEKA data mining software: An update, SIGKDD Explorations 11(1) (2009), 10-18.