Author of the publication

Multi-Level Interaction Based Knowledge Graph Completion.

, , , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Propagation characteristics of exposure effect on double-layer weighted social networks., , and . J. Complex Networks, (December 2023)NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint., , , , , and . EISA, volume 1403 of Communications in Computer and Information Science, page 21-35. Springer, (2021)Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks., , , and . IEEE Internet Things J., 7 (5): 3948-3957 (2020)JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating., , , , , and . EISA, volume 1403 of Communications in Computer and Information Science, page 128-143. Springer, (2021)A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs., , , , and . IEEE Access, (2020)Leaf Recognition Based on Elliptical Half Gabor and Maximum Gap Local Line Direction Pattern., , , and . IEEE Access, (2020)WNV-Detector: automated and scalable detection of wireless network vulnerabilities., , , , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 85 (2021)Multi-Level Interaction Based Knowledge Graph Completion., , , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2024)SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers., , , , , and . TrustCom, page 1194-1199. IEEE, (2020)