Author of the publication

Detecting Image Spam Based on K-Labels Propagation Model.

, , , , and . IEEE WISA, page 170-175. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametric Analysis of the I-Stage Structure for a Dual-Stage Gas Pressure Reducing Regulator., , , , , and . IEEE Access, (2020)The Utility Challenge of Privacy-Preserving Data-Sharing in Cross-Company Defect Prediction: An Empirical Study of the CLIFF&MORPH Algorithm., , , , and . ICSME, page 80-90. IEEE Computer Society, (2017)去随意推荐的信任评估模型 (Trust Evaluation Model with Eliminating Random Recommendation)., , and . 计算机科学, 43 (4): 155-159 (2016)GEMF: a novel geometry-enhanced mid-fusion network for PLA prediction., , , , , and . Briefings Bioinform., (2024)Harmonic functions based semi-supervised learning for web spam detection., , , , and . SAC, page 74-75. ACM, (2011)Recommendations based on user effective point-of-interest path., , , , , and . Int. J. Machine Learning & Cybernetics, 10 (10): 2887-2899 (2019)Toward gradient bandit-based selection of candidate architectures in AutoGAN., , , and . Soft Comput., 25 (6): 4367-4378 (2021)User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache., , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 657-665. Springer, (2005)Detecting Image Spam Based on K-Labels Propagation Model., , , , and . IEEE WISA, page 170-175. IEEE Computer Society, (2013)