Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Generative Data Imputation Toolbox with Adversarial Learning., , , , , and . ICDE, page 3651-3654. IEEE, (2023)Generative Semi-supervised Learning for Multivariate Time Series Imputation., , , , , and . AAAI, page 8983-8991. AAAI Press, (2021)Mining Alarm Database of Telecommunication Network for Alarm Association Rules., , and . PRDC, page 281-286. IEEE Computer Society, (2005)Discovering Relations Among Entities from XML Documents., , , and . MLDM, volume 4571 of Lecture Notes in Computer Science, page 899-910. Springer, (2007)Retransmission mechanism with probabilistic network coding in wireless networks., , , , , and . GLOBECOM, page 4502-4507. IEEE, (2014)A novel image segmentation method based on fast density clustering algorithm., , , , and . Eng. Appl. Artif. Intell., (2018)On the Construction of Trusted Resource Pool in Clouds., , , , , , and . IEEE WISA, page 373-376. IEEE Computer Society, (2013)A New Self-Adapting Knowledge Fusion System., , , and . FSKD (3), page 454-458. IEEE Computer Society, (2007)0-7695-2874-0.Automatic Data Repair: Are We Ready to Deploy?, , , , and . CoRR, (2023)An Experimental Survey of Missing Data Imputation Algorithms (Extended Abstract)., , , , and . ICDE, page 5737-5738. IEEE, (2024)