Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pool Block Withholding Attack with Rational Miners., , and . IJTCS-FAW, volume 12874 of Lecture Notes in Computer Science, page 3-22. Springer, (2021)Favorite-Candidate Voting for Eliminating the Least Popular Candidate in a Metric Space., , and . AAAI, page 1894-1901. AAAI Press, (2020)Adaptive Multilingual Representations for Cross-Lingual Entity Linking with Attention on Entity Descriptions., , , and . CCKS, volume 1134 of Communications in Computer and Information Science, page 1-12. Springer, (2019)Synthetic Fault Diagnosis Method of Power Transformer Based on Rough Set Theory and Improved Artificial Immune Network Classification Algorithm., , , and . ICNC (6), page 676-681. IEEE Computer Society, (2008)Manipulator motion planning based on task-space constraint guidance., , , and . ROBIO, page 502-507. IEEE, (2021)CN-AutoMIC: Distilling Chinese Commonsense Knowledge from Pretrained Language Models., , , , and . EMNLP, page 9253-9265. Association for Computational Linguistics, (2022)Multi-Grained Spatio-temporal Modeling for Lip-reading.. BMVC, page 276. BMVA Press, (2019)Game-theoretic Analysis of Effort Allocation of Contributors to Public Projects., , , and . IJCAI, page 405-411. ijcai.org, (2021)Approximate Group Fairness for Clustering., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 6381-6391. PMLR, (2021)Monotone k-Submodular Knapsack Maximization: An Analysis of the Greedy+Singleton Algorithm., , and . AAIM, volume 13513 of Lecture Notes in Computer Science, page 144-155. Springer, (2022)