Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems., , , , and . ADMA (4), volume 14179 of Lecture Notes in Computer Science, page 371-386. Springer, (2023)STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things., , , and . J. Supercomput., 80 (3): 3875-3901 (February 2024)Friendship links-based privacy-preserving algorithm against inference attacks., , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 9363-9375 (November 2022)Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings., , , , , and . IEEE Trans. Smart Grid, 11 (4): 3031-3042 (2020)Double Regularization Matrix Factorization Recommendation Algorithm., , and . IEEE Access, (2019)LightPoW: A trust based time-constrained PoW for blockchain in internet of things., , , and . Comput. Networks, (2023)Friend Recall in Online Games via Pre-training Edge Transformers., , , , , , and . CoRR, (2023)Detecting shilling attacks in recommender systems based on analysis of user rating behavior., and . Knowl. Based Syst., (2019)Imagilar: A Real-Time Image Similarity Search System on Mobile Platform., , , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 535-538. Springer, (2013)An Algorithm Based on Influence to Predict Invisible Relationship., , and . AsiaJCIS, page 54-61. IEEE Computer Society, (2018)