Author of the publication

Full-text based context-rich heterogeneous network mining approach for citation recommendation.

, , , , and . JCDL, page 361-370. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterize scientific domain and domain context., , and . JCDL, page 359-360. ACM, (2012)Algebraic Attacks on Round-Reduced Rain and Full AIM-III., , , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 285-310. Springer, (2023)Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures., , , , , , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 41-60. Springer, (2022)Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks., , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 101-125. Springer, (2023)Provable Security of rmHADES Structure., and . CANS, volume 13641 of Lecture Notes in Computer Science, page 258-276. Springer, (2022)Full-Text Citation Analysis: A New Method to Enhance Scholarly Network, , and . Journal of the American Society for Information Science and Technology, (2012)Efficient personalized community detection via genetic evolution., , and . GECCO, page 383-391. ACM, (2019)DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration., , , and . HPCC/DSS/SmartCity, page 302-311. IEEE, (2020)Towards Data-Driven Modelling of Sumoylation Following Heat Shock., , , , and . ICBBE, page 16-21. ACM, (2020)A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers., and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 389-410. Springer, (2015)