Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Differential Evolution Framework Using Network Topology Information for Critical Nodes Detection., , , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (2): 448-457 (April 2023)Null Model-Based Data Augmentation for Graph Classification., , , , , , and . IEEE Trans. Netw. Sci. Eng., 11 (2): 1821-1833 (March 2024)Genetic Network Programming Based Class Association Rule Mining with Attributes Importance for Large Attributes Set., , and . SMC, page 188-193. IEEE, (2013)LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier., , , , and . RSKT, volume 5009 of Lecture Notes in Computer Science, page 483-490. Springer, (2008)Identity Inference on Blockchain Using Graph Neural Network., , , , and . BlockSys, volume 1490 of Communications in Computer and Information Science, page 3-17. Springer, (2021)Cross Cryptocurrency Relationship Mining for Bitcoin Price Prediction., , , , , and . BlockSys, volume 1679 of Communications in Computer and Information Science, page 237-250. Springer, (2022)Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning., , , , and . CoRR, (2021)Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning., , , , , , , and . CoRR, (2023)Dual-channel Early Warning Framework for Ethereum Ponzi Schemes., , , , , and . CoRR, (2022)DeepInsight: Interpretability Assisting Detection of Adversarial Samples on Graphs., , , , , and . CoRR, (2021)