Author of the publication

Transferring Structure Knowledge: A New Task to Fake news Detection Towards Cold-Start Propagation.

, , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bifurcation, intermittent chaos and multi-stability in a two-stage Cournot game with R&D spillover and product differentiation., , , , and . Appl. Math. Comput., (2019)A Practical Parameterized Algorithm for Weighted Minimum Letter Flips Model of the Individual Haplotyping Problem., , , and . FAW, volume 5059 of Lecture Notes in Computer Science, page 16-27. Springer, (2008)AI-GAN: Signal De-Interference via Asynchronous Interactive Generative Adversarial Network., , , , , and . ICME Workshops, page 228-233. IEEE, (2019)Unsupervised Single Image Deraining with Self-Supervised Constraints., , , , and . ICIP, page 2761-2765. IEEE, (2019)Spectral Perturbation Meets Incomplete Multi-view Data., , , , and . IJCAI, page 3677-3683. ijcai.org, (2019)Burst or random error correction based on fire and BCH codes., , and . ITA, page 1-5. IEEE, (2014)Convex mixed integer nonlinear programming problems and an outer approximation algorithm., and . J. Glob. Optim., 63 (2): 213-227 (2015)Detection of abnormal profiles on group attacks in recommender systems., , , , and . SIGIR, page 955-958. ACM, (2014)Load Identification and Deflection Monitoring of Opening Beam on Well-Hole Freight Trains., , , , , , and . IEEE Access, (2020)A trust-based evaluation model for data privacy protection in cloud computing., , and . Int. J. High Perform. Comput. Netw., 14 (2): 147-156 (2019)