Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

k-Anonymously Private Search over Encrypted Data., and . CoRR, (2017)An Asymptotically Tighter Bound on Sampling for Frequent Itemsets Mining, and . (2017)cite arxiv:1703.08273Comment: 13 pages, 2 figures, 2 tables.Reconciling Feature-Reuse and Overfitting in DenseNet with Specialized Dropout., , , , and . ICTAI, page 760-767. IEEE, (2019)Reconciling Feature-Reuse and Overfitting in DenseNet with Specialized Dropout., , , and . CoRR, (2018)Penetrating the Fog: the Path to Efficient CNN Models., , , and . CoRR, (2018)Domain-Adversarial Multi-Task Framework for Novel Therapeutic Property Prediction of Compounds., , , , , , , and . CoRR, (2018)An Empirical Study on Quality Issues of eBay's Big Data SQL Analytics Platform., , , , , , , , , and 2 other author(s). ICSE (SEIP), page 33-42. IEEE, (2022)Weighted-Sampling Audio Adversarial Example Attack., , , , and . AAAI, page 4908-4915. AAAI Press, (2020)A Rapid Incremental Frequent Pattern Mining Algorithm for Uncertain Data., , , , and . ACIT/CSII/BCD, page 284-288. IEEE, (2017)A Weight-Based Data Pre-processing Mechanism for Improving the Accuracy of the Massive Traffic Flow Prediction., , , , and . ACIT/CSII/BCD, page 272-277. IEEE, (2017)