Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chapter One - A Deep-forest based approach for detecting fraudulent online transaction., , , , , and . Adv. Comput., (2021)Concept and Attention-Based CNN for Question Retrieval in Multi-View Learning., , , , , , and . ACM Trans. Intell. Syst. Technol., 9 (4): 41:1-41:24 (2018)Integration of Link and Semantic Relations for Information Recommendation., , , , , and . Comput. Informatics, 35 (1): 30-54 (2016)Makespan-Driven Workflow Scheduling in Clouds Using Immune-Based PSO Algorithm., , , and . IEEE Access, (2020)Orientation Analysis for Chinese News Based on Word Embedding and Syntax Rules., , , , and . IEEE Access, (2019)Efficient Codes for Adversarial Wiretap Channels., and . CoRR, (2014)一种基于社区分类的社交网络用户推荐方法 (Novel Method on Community-based User Recommendation on Social Network)., , and . 计算机科学, 43 (5): 198-203 (2016)Obstacle Detection Method Based on RSU and Vehicle Camera Fusion., , , , , , , , , and 1 other author(s). Sensors, 23 (10): 4920 (2023)An Adaptive Data Placement Architecture in Multicloud Environments., , , , and . Sci. Program., (2020)Adversarial Wiretap Channel with Public Discussion., and . CoRR, (2014)