Author of the publication

Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . Nucleic Acids Res., 50 (D1): 27-38 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical interference alignment and cancellation for MIMO underlay cognitive radio networks with multiple secondary users., , and . GLOBECOM, page 1009-1014. IEEE, (2013)QoE-based MAC Layer Optimization for Video Teleconferencing over WiFi., , and . CoRR, (2016)LSTM-EFG for wind power forecasting based on sequential correlation features., , , , , , , , and . Future Gener. Comput. Syst., (2019)VISDB: a manually curated database of viral integration sites in the human genome., , , , , , , and . Nucleic Acids Res., 48 (Database-Issue): D633-D641 (2020)HAPZSL: A hybrid attention prototype network for knowledge graph zero-shot relational learning., , , , , , , and . Neurocomputing, (2022)Contextualized End-to-End Speech Recognition with Contextual Phrase Prediction Network., , , , , , and . CoRR, (2023)AMGC: Adaptive match-based genomic compression algorithm., , , , , and . CoRR, (2023)A First Order Meta Stackelberg Method for Robust Federated Learning., , , , , and . CoRR, (2023)Community detection based on community perspective and graph convolutional network., , and . Expert Syst. Appl., (November 2023)Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain., , , , , , , and . IJDSN, (2018)