Author of the publication

Trust-aware generative adversarial network with recurrent neural network for recommender systems.

, , , , , and . Int. J. Intell. Syst., 36 (2): 778-795 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Port and Address Hopping for Active Cyber-Defense., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 295-300. Springer, (2007)Identity Authentication Strategy of Mobile Crowd Sensing based on CFL., , , and . QRS, page 139-146. IEEE, (2022)An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education., and . ASIST, volume 59 of Proc. Assoc. Inf. Sci. Technol., page 706-708. Wiley, (2022)Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy., , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4186-4197 (December 2023)A decentralized and personalized spam filter based on social computing., , , and . IWCMC, page 887-894. IEEE, (2014)Trust-aware generative adversarial network with recurrent neural network for recommender systems., , , , , and . Int. J. Intell. Syst., 36 (2): 778-795 (2021)A Dynamic Trust Conference Algorithm for Social Network., , , , and . 3PGCIC, page 340-346. IEEE, (2013)Full Service Hopping for Proactive Cyber-Defense., , and . ICNSC, page 1337-1342. IEEE, (2008)Multi-dimensional LSTM: A Model of Network Text Classification., , , , and . WASA (3), volume 12939 of Lecture Notes in Computer Science, page 209-217. Springer, (2021)An ACO-Based Trust Inference Algorithm., , and . BWCCA, page 216-220. IEEE Computer Society, (2014)