Author of the publication

PP-DBLP: Modeling and Generating Attributed Public-Private Networks with DBLP.

, , , , , and . ICDM Workshops, page 986-989. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services., and . IEEE Trans. Parallel Distributed Syst., 21 (10): 1458-1472 (2010)Mining High Utility Sequential Patterns Using Multiple Minimum Utility., , and . Int. J. Pattern Recognit. Artif. Intell., 32 (10): 1859017:1-1859017:18 (2018)MaxiZone: Maximizing Influence Zone Over Geo-Textual Data., , , and . IEEE Trans. Knowl. Data Eng., 33 (10): 3381-3393 (2021)Authenticating Aggregate Queries over Set-Valued Data with Confidentiality., , , , and . IEEE Trans. Knowl. Data Eng., 30 (4): 630-644 (2018)Graph Learning for Combinatorial Optimization: A Survey of State-of-the-Art., , and . Data Sci. Eng., 6 (2): 119-141 (2021)AUTOSHAPE: An Autoencoder-Shapelet Approach for Time Series Clustering., , , , , and . CoRR, (2022)Authenticated Key-Value Stores with Hardware Enclaves., , , , and . CoRR, (2019)Distortion-based anonymity for continuous queries in location-based mobile services., , and . GIS, page 256-265. ACM, (2009)边缘海静力数值预报模式并行算法研究 (Parallelization of Hydrostatic Numerical Forecasting Model of Marginal Sea)., , , , , and . 计算机科学, 43 (1): 14-17 (2016)Lightweight Blockchain Logging for Data-Intensive Applications., , , , and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 308-324. Springer, (2018)