Author of the publication

Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . Nucleic Acids Res., 50 (D1): 27-38 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring causal molecular networks: empirical assessment through a community-based effort, , , , , , , , , and 163 other author(s). Nature Methods, 13 (4): 310--318 (Feb 22, 2016)Unveiling Qzone: A measurement study of a large-scale online social network., , , , , and . Inf. Sci., (April 2023)Many-to-Many Matching-Theory-Based Dynamic Bandwidth Allocation for UAVs., , , and . IEEE Internet Things J., 8 (12): 9995-10009 (2021)IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems., , and . J. Networks, 7 (10): 1624-1630 (2012)Accelerating Surgical Simulation Development via OpenSurgSim: Burr Hole Trainer., , , , , , , and . MMVR, volume 220 of Studies in Health Technology and Informatics, page 39-44. IOS Press, (2016)Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model., , , and . CoRR, (2021)Improving IoT data availability via feedback- and voting-based anomaly imputation., , , , and . Future Gener. Comput. Syst., (2022)Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm., , , , , and . Knowl. Based Syst., (2020)Using deep learning to solve computer security challenges: a survey., , , , , , , and . Cybersecur., 3 (1): 15 (2020)Implicit Offensive Speech Detection Based on Multi-feature Fusion., , , , , and . KSEM (2), volume 14118 of Lecture Notes in Computer Science, page 27-38. Springer, (2023)