Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Messages Ranking in Social Network., , and . Intelligent Information Processing, volume 385 of IFIP Advances in Information and Communication Technology, page 268-275. Springer, (2012)Storage Device Performance Prediction with Hybrid Regression Models., , , and . PDCAT, page 556-559. IEEE, (2012)Maximizing the Coverage of Information Propagation in Social Networks., , , , , and . IJCAI, page 2104-2110. AAAI Press, (2015)Context-Aware Dual-Attention Network for Natural Language Inference., , , , , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 185-198. Springer, (2019)A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol., , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 806-811. Springer, (2006)Profit-based on-demand broadcast scheduling of real-time multi-item requests., , , and . SAC, page 580-584. ACM, (2010)Automatic Domain Ontology Generation from Web sites., , and . Transactions of the SDPS, 9 (3): 29-38 (2005)Model Stealing Attack against Graph Classification with Authenticity, Uncertainty and Diversity., , , , , and . CoRR, (2023)Securing Recommender System via Cooperative Training., , , and . CoRR, (2024)Heterogeneous-attributes enhancement deep framework for network embedding., , , , and . Frontiers Comput. Sci., 15 (6): 156616 (2021)