Author of the publication

Nice to meet images with Big Clusters and Features: A cluster-weighted multi-modal co-clustering method.

, , , , , , , and . Inf. Process. Manag., 61 (5): 103735 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algorithm to Generate Password Structure Dictionary Based on Gene Bank., , , and . CyberC, IEEE, (2018)Predicting the results of molecular specific hybridization using boosted tree algorithm., , , , , and . Concurr. Comput. Pract. Exp., (2020)A Fuzzy-Rough Sets Based Compact Rule Induction Method for Classifying Hybrid Data., , , and . RSKT, volume 7414 of Lecture Notes in Computer Science, page 63-70. Springer, (2012)Nice to meet images with Big Clusters and Features: A cluster-weighted multi-modal co-clustering method., , , , , , , and . Inf. Process. Manag., 61 (5): 103735 (2024)Mimic Encryption System for Network Security., , , and . IEEE Access, (2018)CFRV: A Decentralized Control-Flow Attestation Schema Using Mutual Secret Sharing., , , and . Sensors, 22 (16): 6044 (2022)The Algorithms of Weightening Based on DNA Sticker Model., , and . ICPCSEE (2), volume 902 of Communications in Computer and Information Science, page 250-262. Springer, (2018)An Approach on Service Component Selection and Analysis of the Resulting System Reliability., , and . CIT, page 1246-1250. IEEE Computer Society, (2010)GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification., , , and . TrustCom, page 422-433. IEEE, (2023)Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors., , , , and . ICPCSEE (1), volume 1451 of Communications in Computer and Information Science, page 180-189. Springer, (2021)