Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XYLayoutLM: Towards Layout-Aware Multimodal Networks For Visually-Rich Document Understanding., , , , , , and . CVPR, page 4573-4582. IEEE, (2022)SAD: Semi-Supervised Anomaly Detection on Dynamic Graphs., , , , , , , , , and . IJCAI, page 2306-2314. ijcai.org, (2023)Scaling Up Dynamic Graph Representation Learning via Spiking Neural Networks., , , , , , , , and . CoRR, (2022)Towards Learning to Discover Money Laundering Sub-network in Massive Transaction Network., , , , , , and . AAAI, page 14153-14160. AAAI Press, (2023)Scaling Up Dynamic Graph Representation Learning via Spiking Neural Networks., , , , , , , , and . AAAI, page 8588-8596. AAAI Press, (2023)Mobile User Interface Element Detection Via Adaptively Prompt Tuning., , , , , and . CVPR, page 11155-11164. IEEE, (2023)GUARD: Graph Universal Adversarial Defense., , , , , , , and . CIKM, page 1198-1207. ACM, (2023)What's Behind the Mask: Understanding Masked Graph Modeling for Graph Autoencoders., , , , , , , , and . KDD, page 1268-1279. ACM, (2023)A2: Efficient Automated Attacker for Boosting Adversarial Training., , , , , , , and . NeurIPS, (2022)Backpropagation Path Search On Adversarial Transferability., , , , , and . ICCV, page 4640-4650. IEEE, (2023)