Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of False Weibo Repost Based on XGBoost., , and . WI (Companion), page 97-105. ACM, (2019)Coverage Algorithm Based on Perceived Environment Around Nodes in Mobile Wireless Sensor Networks., and . Wirel. Pers. Commun., 128 (4): 2725-2740 (February 2023)Identification and validation of a radiomic signature for predicting survival outcomes in non-small-cell lung cancer treated with radiation therapy., , and . ICMLA, page 570-574. IEEE, (2021)PREM: A Simple Yet Effective Approach for Node-Level Graph Anomaly Detection., , , and . ICDM, page 1253-1258. IEEE, (2023)GOOD-D: On Unsupervised Graph Out-Of-Distribution Detection., , , and . WSDM, page 339-347. ACM, (2023)On Improving Summarization Factual Consistency from Natural Language Feedback., , , , , and . CoRR, (2022)Securing Biomedical Images from Unauthorized Training with Anti-Learning Perturbation., , , and . CoRR, (2023)Surfer100: Generating Surveys From Web Resources on Wikipedia-style., , , , , , , , , and . CoRR, (2021)Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise., , , and . CoRR, (2023)BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT., , , and . CoRR, (2023)