Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Complex Network Robustness Attack Algorithm., , , and . BSCI, page 13-17. ACM, (2019)Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network., , and . WISE (1), volume 10569 of Lecture Notes in Computer Science, page 75-90. Springer, (2017)Exchange, adopt, evolve: Modeling the spreading of opinions through cognition and interaction in a social network., , and . Inf. Sci., (2021)Gist Trace-based Learning: Efficient Convention Emergence from Multilateral Interactions., , , and . ACM Trans. Auton. Adapt. Syst., 16 (1): 2:1-2:20 (2021)Centralization Problem for Opinion Convergence in Decentralized Networks., , , , and . CoRR, (2022)Contrastive Learning with Logic-driven Data Augmentation for Logical Reasoning over Text., , , , , , , , , and . CoRR, (2023)Integrating Networks of Equipotent Nodes., and . CSoNet, volume 9795 of Lecture Notes in Computer Science, page 39-50. Springer, (2016)What Becomes of the Broken Hearted?: An Agent-Based Approach to Self-Evaluation, Interpersonal Loss, and Suicide Ideation., , and . AAMAS, page 436-445. ACM, (2017)Graph-Based Covert Transaction Detection and Protection in Blockchain., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)The impact of top scientists on the community development of basic research directed by government funding: evidence from program 973 in China., , and . Scientometrics, 126 (10): 8561-8579 (2021)