Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Few-shot learning for trajectory outlier detection with only normal trajectories., , and . IJCNN, page 1-8. IEEE, (2023)LRHNE: A Latent-Relation Enhanced Embedding Method for Heterogeneous Information Networks., , , , and . CIKM, page 1923-1932. ACM, (2020)Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation., , , , , , and . CIKM, page 905-914. ACM, (2022)STTM: Similarity Transitivity Chain Based Trust Model in P2P Environment., , and . ICC, page 1-5. IEEE, (2010)RPIM: Inferring BGP Routing Policies in ISP Networks., , , and . GLOBECOM, page 1-6. IEEE, (2011)Trajectory clustering via deep representation learning., , , , and . IJCNN, page 3880-3887. IEEE, (2017)HGCN: A Heterogeneous Graph Convolutional Network-Based Deep Learning Model Toward Collective Classification., , , and . KDD, page 1161-1171. ACM, (2020)Deep Dirichlet Process Mixture Model for Non-parametric Trajectory Clustering., , , , , and . ICDE, page 4449-4462. IEEE, (2024)DSRelay: A scheme of cooperative downloading based on dynamic slot., , , , and . ICC, page 381-386. IEEE, (2012)Towards coordinated congestion control and load balancing in datacenter networks., , , , and . GLOBECOM, page 1285-1290. IEEE, (2013)