Author of the publication

Deep-Learning-based Identification of Influential Spreaders in Online Social Networks.

, , , and . IECON, page 6854-6858. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Relay Nodes Selection Scheme with Zero Forcing Weighting Matrix in MIMO Relay Networks., , , and . VTC Fall, page 1-5. IEEE, (2010)Dissipativity analysis of neural networks with time-varying delays., , , , and . Neurocomputing, (2015)Exponential stabilization of neural networks with time-varying delay by periodically intermittent control., , , and . Neurocomputing, (2016)Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hiding.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 610-621. SPIE, (2004)Integrated Intelligent Control of Gas Mixing-and-Pressurization Process., , , and . IEEE Trans. Contr. Sys. Techn., 17 (1): 68-77 (2009)Experimental Selection and Verification of Maximum-Heart-Rate Formulas for Use with Karvonen Formula., , , , , and . ICINCO (2), page 536-541. SciTePress, (2013)Cloud Computing: Hype or Vision.. ICAIC (4), volume 227 of Communications in Computer and Information Science, page 346-353. Springer, (2011)Design of Observer-Based H∞ Robust Repetitive-Control System., , and . IEEE Trans. Automat. Contr., 56 (6): 1452-1457 (2011)Taking Up the Torch From the Editor.. IEEE Signal Process. Mag., 32 (1): 4-6 (2015)Signal Processing: The Expected and the Unexpected From the Editor.. IEEE Signal Process. Mag., 34 (1): 3 (2017)