Author of the publication

Inferring Private Attributes Based on Graph Convolutional Neural Network in Social Networks.

, , , and . NaNA, page 186-190. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Overlapping Communities by Increasing the Determinacy of SLPA in Complex Networks., , , , , and . IScIDE, volume 11266 of Lecture Notes in Computer Science, page 111-122. Springer, (2018)Coordinated attacks against substations and transmission lines in power grids., , , , and . GLOBECOM, page 655-661. IEEE, (2014)SMT-based Multi-objective Optimization for Scheduling of MPSoC Applications., , , , and . TASE, page 160-167. IEEE, (2019)Online product category and pricing strategies of land-based retailers: Homogenous vs prototypical orientation., , , and . Internet Res., 29 (1): 245-270 (2019)A direct-conversion mixer with DC-offset cancellation for IEEE 802.11a WLAN receiver., , , , , , and . ISCAS, IEEE, (2006)The sequential attack against power grid networks., , , , and . ICC, page 616-621. IEEE, (2014)A new technique for analyzing asymptotic outage performance of diversity over lognormal fading channels., , , , , and . CWIT, page 1-5. IEEE, (2017)An Uncertain Graph Approach for Preserving Privacy in Social Networks Based on Important Nodes., , , , and . NaNA, page 107-111. IEEE, (2018)Detection of false data attacks in smart grid with supervised learning., , and . IJCNN, page 1395-1402. IEEE, (2016)Characterizing and detecting resource leaks in Android applications., , , , and . ASE, page 389-398. IEEE, (2013)