Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path-aware multi-hop graph towards improving graph learning., , , and . Neurocomputing, (2022)Byzantine-Robust Federated Learning via Credibility Assessment on Non-IID Data., , , and . CoRR, (2021)FedDDB: Clustered Federated Learning based on Data Distribution Difference., , , and . ACAI, page 73:1-73:6. ACM, (2022)A hybrid method of recommending POIs based on context and personal preference confidence., , , and . BDCAT, page 287-292. ACM, (2016)Non-Autoregressive Neural Machine Translation with Consistency Regularization Optimized Variational Framework., , and . NAACL-HLT, page 607-617. Association for Computational Linguistics, (2022)Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity., , , and . IEEE Trans. Comput. Social Systems, 5 (3): 796-806 (2018)Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets., , , , and . IEEE Internet of Things Journal, 4 (5): 1216-1228 (2017)Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features., , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 588-604. Springer, (2019)Benchmark Datasets for Stochastic Petri Net Learning., , , , and . IJCNN, page 1-8. IEEE, (2021)MUSH: Multi-scale Hierarchical Feature Extraction for Semantic Image Synthesis., , , , and . ACCV (7), volume 13847 of Lecture Notes in Computer Science, page 185-201. Springer, (2022)