Author of the publication

Detecting Outlier Patterns with Query-based Artificially Generated Searching Conditions.

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless Sensor Technologies and Applications.. Sensors, 9 (11): 8824-8830 (2009)Sentiment Analysis Based on Weighted Word2vec and Att-LSTM., , , and . CSAI/ICIMT, page 420-424. ACM, (2018)Immunity-Based Model for Malicious Code Detection., , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)An energy-efficient localization strategy for smartphones., , , and . Comput. Sci. Inf. Syst., 8 (4): 1117-1128 (2011)Shifu2: A Network Representation Learning Based Model for Advisor-Advisee Relationship Mining., , , , , , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1763-1777 (2021)Follow the Title Then Read the Article: Click-Guide Network for Dwell Time Prediction., , , , , , and . IEEE Trans. Knowl. Data Eng., 33 (7): 2903-2913 (2021)Multi-Granularity Click Confidence Learning via Self-Distillation in Recommendation., , , , and . CoRR, (2023)Chu-ko-nu: A Reliable, Efficient, and Anonymously Authentication-Enabled Realization for Multi-Round Secure Aggregation in Federated Learning., , , , , and . CoRR, (2024)A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems, , , and . CoRR, (2012)CenGCN: Centralized Convolutional Networks with Vertex Imbalance for Scale-Free Graphs., , , , , , and . CoRR, (2022)