Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Cluster-Based Computational Method to Identify miRNA Regulatory Modules., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (2): 681-687 (2019)An Efficient Recommendation Algorithm Based on Heterogeneous Information Network., and . Complex., (2021)Privacy protection and integrity verification of aggregate queries in cloud computing., , , , and . Clust. Comput., 22 (Supplement): 5763-5773 (2019)Warehouse Financing Risk Analysis for SMEs in China., , , , and . ICSS, page 43-48. IEEE Computer Society, (2010)Privacy-Preserving Models for Legal Natural Language Processing., and . NLLP@EMNLP, page 172-183. Association for Computational Linguistics, (2022)How to better utilize code graphs in semantic code search?, , , , , , , and . ESEC/SIGSOFT FSE, page 722-733. ACM, (2022)Attenuation Compensation and Q Estimation of Nonstationary Data Using Semi-Supervised Learning., , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Drivers and outcomes of circular economy implementation: evidence from China., , , , , and . Ind. Manag. Data Syst., 123 (4): 1178-1197 (2023)Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning., , , , , , and . J. Comput. Virol. Hacking Tech., 18 (4): 453-463 (2022)DHNE: Network Representation Learning Method for Dynamic Heterogeneous Networks., , , and . IEEE Access, (2019)