Author of the publication

MADC: Multi-scale Attention-based Deep Clustering for Workload Prediction.

, , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 316-323. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Intrusion Detection Framework Based on Embedded Tree Model., , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 410-417. Springer, (2019)PFL-MoE: Personalized Federated Learning Based on Mixture of Experts., , , , , and . CoRR, (2020)Accurate and Efficient Counting in Dynamic Networks., , , and . SRDS, page 301-310. IEEE Computer Society, (2014)The Power and Limit of Adding Synchronization Messages for Synchronous Agreement., , , and . ICPP, page 399-406. IEEE Computer Society, (2006)PDFE: Flexible Parallel State Machine Replication for Cloud Computing., , , and . CLUSTER, page 456-465. IEEE Computer Society, (2018)Message from the Technical Program Chairs: MSN 2022., and . MSN, page xxvii-xxviii. IEEE, (2022)Speeding Up Multi-level Route Analysis Through Improved Multi-LCS Algorithm., , , and . TRIDENTCOM, volume 137 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 327-337. Springer, (2014)FSAFA-stacking2: An Effective Ensemble Learning Model for Intrusion Detection with Firefly Algorithm Based Feature Selection., , , , and . ICA3PP (2), volume 13156 of Lecture Notes in Computer Science, page 555-570. Springer, (2021)Processing Partially Ordered Requests in Distributed Stream Processing Systems., , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 211-219. Springer, (2016)A Message Efficient Intersection Control Algorithm Based on VANETs., and . IOV, volume 8662 of Lecture Notes in Computer Science, page 31-41. Springer, (2014)