Author of the publication

Contrastive Representation Learning Based on Multiple Node-centered Subgraphs.

, , , and . CIKM, page 1338-1347. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topological Resilience Analysis of Supply Networks under Random Disruptions and Targeted Attacks., , and . ASONAM, page 250-257. ACM, (2015)Multiple Anomaly Alignments on Network Traffics., , , , , , and . ICKG, page 313-320. IEEE, (2022)P2P traffic identification method based on an improvement incremental SVM learning algorithm., , , and . WPMC, page 174-179. IEEE, (2014)Driving Maneuvers Analysis Using Naturalistic Highway Driving Data., , , , , and . ITSC, page 1761-1766. IEEE, (2015)FreeNavi: Landmark-Based Mapless Indoor Navigation Based on WiFi Fingerprints., , and . VTC Spring, page 1-5. IEEE, (2017)A Graph-Based Approach for Clustering Analysis of Gene Expression Data by Using Topological Features., , , and . CSIE (1), page 559-563. IEEE Computer Society, (2009)MSGAN: Multi-Stage Generative Adversarial Networks for Cross-Modality Domain Adaptation., , , and . EMBC, page 520-524. IEEE, (2022)An Implementation of Face Recognition System with Face Presentation Attack Detection on Raspberry Pi., , , , , and . ICEBE, page 70-75. IEEE, (2021)Blockchain based Joint Task Scheduling and Supply-Demand Configuration for Smart Manufacturing., , , , and . WCNC, page 1-6. IEEE, (2021)Discovering Traffic Outlier Causal Relationship Based on Anomalous DAG., , , , , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 71-80. Springer, (2015)