Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (4): 488-501 (2016)Development of a Confocal Optical System Design for Molecular Imaging Applications of Biochip., , , , , , , , and . Int. J. Biomedical Imaging, (2007)Privileged Features Distillation at Taobao Recommendations., , , , , , , , , and . KDD, page 2590-2598. ACM, (2020)VoteTrust: Leveraging friend invitation graph to defend against social network Sybils., , , , , and . INFOCOM, page 2400-2408. IEEE, (2013)Faceted Navigation for Software Exploration., , and . ICPC, page 193-196. IEEE Computer Society, (2011)Large Scale Product Graph Construction for Recommendation in E-commerce., , , , and . CoRR, (2020)Graph-based Regularization on Embedding Layers for Recommendation., , , , , and . ACM Trans. Inf. Syst., 39 (1): 2:1-2:27 (2020)Commonsense Knowledge Adversarial Dataset that Challenges ELECTRA., , , , , , and . ICARCV, page 315-320. IEEE, (2020)Colon Polyp Detection and Segmentation Based on Improved MRCNN., , , , , and . IEEE Trans. Instrum. Meas., (2021)A Feasibility Study Of UML In The Software Defined Radio.. DELTA, page 157-162. IEEE Computer Society, (2004)