Author of the publication

Counter-Empirical Attacking based on Adversarial Reinforcement Learning for Time-Relevant Scoring System.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sparse representation and learning in visual recognition: Theory and applications., , , and . Signal Process., 93 (6): 1408-1425 (2013)ePMLF: Efficient and Privacy-Preserving Machine Learning Framework Based on Fog Computing., , , , and . Int. J. Intell. Syst., (2023)Single-Phase Bridgeless Rectifier Based System With Enhanced Capability of Reactive Power Compensation., , , , , and . IEEE Access, (2019)Quantification of the Leakage in Federated Learning., , , and . CoRR, (2019)Learning Coupled Parameters with Continuous Domains for Human-powered Lower Exoskeleton., , , and . ICARM, page 189-194. IEEE, (2018)Approximate Frequent Itemset Mining In the Presence of Random Noise., , and . Soft Computing for Knowledge Discovery and Data Mining, Springer, (2008)Robust Reputation-Based Ranking on Bipartite Rating Networks., , , and . SDM, page 612-623. SIAM / Omnipress, (2012)Exploiting Context Graph Attention for POI Recommendation in Location-Based Social Networks., and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 83-99. Springer, (2018)Robust Principal Component Analysis with Missing Data., , , and . CIKM, page 1149-1158. ACM, (2014)Frequent pattern mining: current status and future directions., , , and . Data Min. Knowl. Discov., 15 (1): 55-86 (2007)