Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modulating Hysteresis of Perovskite Solar Cells by a Poling Voltage, , , , , , and . The Journal of Physical Chemistry C, 120 (40): 22784-22792 (2016)SKeyword: Ontology-driven Semantic Keyword Search for Heterogeneous XML Data Sources., , , and . International Conference on Internet Computing, page 20-26. CSREA Press, (2009)Comparing human behavior models in repeated Stackelberg security games: An extended study., , , , , and . Artif. Intell., (2016)A Comprehensive Pipeline for Complex Text-to-Image Synthesis., , , , , and . J. Comput. Sci. Technol., 35 (3): 522-537 (2020)Language Agents with Reinforcement Learning for Strategic Play in the Werewolf Game., , , , and . CoRR, (2023)Deep Reinforcement Learning for Green Security Games with Real-Time Information., , , , , , and . CoRR, (2018)MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance., , , , and . Connect. Sci., (December 2023)Scenario-Adaptive and Self-Supervised Model for Multi-Scenario Personalized Recommendation., , , , , and . CIKM, page 3674-3683. ACM, (2022)UDM: A Unified Deep Matching Framework in Recommender Systems., , , and . CIKM, page 3122-3130. ACM, (2022)Harvester: Principled Factorization-based Temporal Tensor Granularity Estimation., , , , , and . SDM, page 82-90. SIAM, (2023)