Author of the publication

Research on flexible resource access strategy based on block chain technology.

, , , , , and . ICBCT, page 126-130. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximum a Posteriori Estimation for Information Source Detection., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (6): 2242-2256 (2020)Are Bert Family Good Instruction Followers? A Study on Their Potential And Limitations., , , , , , , and . ICLR, OpenReview.net, (2024)Maximizing the Coverage of Information Propagation in Social Networks., , , , , and . IJCAI, page 2104-2110. AAAI Press, (2015)Delving Deep into Regularity: A Simple but Effective Method for Chinese Named Entity Recognition., , , , , and . NAACL-HLT (Findings), page 1863-1873. Association for Computational Linguistics, (2022)A Markov Chain Monte Carlo Approach for Source Detection in Networks., , , , , and . SMP, volume 774 of Communications in Computer and Information Science, page 77-88. Springer, (2017)How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions., , , , , , and . CoRR, (2023)The solution to matrix equation AX+XTC=B., , and . J. Frankl. Inst., 344 (8): 1056-1062 (2007)Finding Gangs in War from Signed Networks., , , , , and . KDD, page 1505-1514. ACM, (2016)Ontological Concept Structure Aware Knowledge Transfer for Inductive Knowledge Graph Embedding., , , , , , and . IJCNN, page 1-8. IEEE, (2021)Maximizing the Effect of Information Adoption: A General Framework., , , , , and . SDM, page 693-701. SIAM, (2018)