Author of the publication

A survey of few-shot knowledge graph completion.

, , , , , , and . J. Intell. Fuzzy Syst., 45 (4): 6127-6143 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Complexity Reduction Scheme for Depth Coding in 3D-HEVC., , , , and . Inf., 10 (5): 164 (2019)Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network., , , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 47-56. Springer, (2019)Implementation of Leaf Image Recognition System Based on LBP and B/S Framework., , , , , and . ICIC (1), volume 9225 of Lecture Notes in Computer Science, page 661-670. Springer, (2015)An Object Region Extraction Approach Based on Interest Pixel Detection and Inner Filling Strategy., , and . MVHI, page 401-404. IEEE Computer Soceity, (2010)Research on Migration Risk of Island Countries Based on Neural Network., , , , , and . CSAE, page 46:1-46:5. ACM, (2020)Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things., , , , , and . Sensors, 19 (23): 5237 (2019)Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe., , , , and . J. Inf. Secur. Appl., (2019)Extract Features Using Stacked Denoised Autoencoder., , , , and . ICIC (3), volume 8590 of Lecture Notes in Computer Science, page 10-14. Springer, (2014)A Model of Intrusion Prevention Base on Immune., , , and . IAS, page 441-444. IEEE Computer Society, (2009)IP Geolocation Base on Local Delay Distribution Similarity., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 383-395. Springer, (2017)