Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation., , , , , , and . CoRR, (2023)MERGE: Fast Private Text Generation., , , , and . CoRR, (2023)Monitoring abnormal network traffic based on blind source separation approach., , , , and . J. Netw. Comput. Appl., 34 (5): 1732-1742 (2011)Multi-Action Dialog Policy Learning from Logged User Feedback., , , , , , , and . AAAI, page 13976-13983. AAAI Press, (2023)SegFormer: A Topic Segmentation Model with Controllable Range of Attention., , , and . AAAI, page 12545-12552. AAAI Press, (2023)Contrastive Representation based Active Learning for Time Series., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks., , , , and . CoRR, (2014)Efficiently Estimating Subgraph Statistics of Large Networks in the Dark., , , , , and . CoRR, (2013)A Peep on the Interplays between Online Video Websites and Online Social Networks, , , , and . CoRR, (2013)Sampling node pairs over large graphs., , , , and . ICDE, page 781-792. IEEE Computer Society, (2013)