Author of the publication

EnMatch: Matchmaking for Better Player Engagement via Neural Combinatorial Optimization.

, , , , , , , , , and . AAAI, page 9098-9106. AAAI Press, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selection of Landsat-8 Operational Land Imager (OLI) Optimal Band Combinations for Mapping Alteration Zones., , , , and . Remote. Sens., 16 (2): 392 (January 2024)Secure Multi-Party Computation: Theory, practice and applications., , , , , , and . Inf. Sci., (2019)Find Your Organization in MMORPGs., , , , , , and . IEEE Trans. Games, 14 (3): 446-455 (2022)Skeleton-based Action Recognition via Temporal-Channel Aggregation., , , , , and . CoRR, (2022)Subgraph Networks with Application to Structural Feature Space Expansion., , , , , , and . CoRR, (2019)RL4RS: A Real-World Dataset for Reinforcement Learning based Recommender System., , , , , , , , , and . SIGIR, page 2935-2944. ACM, (2023)Investigating Accuracy-Novelty Performance for Graph-based Collaborative Filtering., , , , , , , , , and . SIGIR, page 50-59. ACM, (2022)Improved Power Analysis Attack Based on the Preprocessed Power Traces., , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 278-289. Springer, (2016)Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (5): 912-927 (2020)Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries., , , , and . Trustcom/BigDataSE/ISPA, page 418-425. IEEE, (2016)