Author of the publication

BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation.

, , , , and . ICTAI, page 840-847. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC., , , , and . ICCD, page 585-593. IEEE, (2019)SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario., , , , , and . IJCNN, page 1-10. IEEE, (2020)Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks., , , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 41-57. Springer, (2016)Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis., , , , , and . AsiaCCS, page 807-818. ACM, (2016)Incorporating Attributes Semantics into Knowledge Graph Embeddings., , , , and . CSCWD, page 620-625. IEEE, (2021)A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia., , , , , and . IACR Cryptol. ePrint Arch., (2015)A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers., , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 415-434. Springer, (2017)Leveraging Knowledge Context Information to Enhance Personalized Recommendation., , , , and . ICONIP (3), volume 12534 of Lecture Notes in Computer Science, page 467-478. Springer, (2020)More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A., , , , and . APSEC, page 410-417. IEEE, (2019)Knowledge Graph Embedding with Order Information of Triplets., , , , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 476-488. Springer, (2019)