Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , and . CoRR, (2018)Simulation and inversion of electrical conductivity distribution using the finite functions method., , , , and . FSKD, page 2746-2749. IEEE, (2012)Research on Embedded-Based Wireless Authentication System., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 469-475. Springer, (2012)Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , and . RecSys, page 385-386. ACM, (2016)A survey on security control and attack detection for industrial cyber-physical systems., , , , and . Neurocomputing, (2018)Temporally Invariant Junction Tree for Interference in Dynamic Bayesian Network.. Artificial Intelligence Today, volume 1600 of Lecture Notes in Computer Science, Springer, (1999)The structure of communities in scale-free networks., , , , , and . Concurr. Comput. Pract. Exp., (2017)A microscopic competition model and its dynamics analysis on network attacks., , and . Concurr. Comput. Pract. Exp., 22 (4): 503-517 (2010)Negative-supervised capsule graph neural network for few-shot text classification., , and . J. Intell. Fuzzy Syst., 41 (6): 6875-6887 (2021)