From post

Application of Graph Regularized Non-negative Matrix Factorization in Characteristic Gene Selection.

, , , , и . ICIC (2), том 9226 из Lecture Notes in Computer Science, стр. 601-611. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem ., , и . SNPD (3), стр. 1176-1182. IEEE Computer Society, (2007)A nonlinear and noise-tolerant ZNN model solving for time-varying linear matrix equation., , , и . Neurocomputing, (2018)A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks., , , и . EUC (1), стр. 330-336. IEEE Computer Society, (2008)Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage., , , , и . WASA, том 11604 из Lecture Notes in Computer Science, стр. 162-174. Springer, (2019)Distributed Algorithm for Truss Maintenance in Dynamic Graphs., , , , и . PDCAT, том 12606 из Lecture Notes in Computer Science, стр. 104-115. Springer, (2020)Jamming-Resilient Message Dissemination in Wireless Networks., , , , , и . IEEE Trans. Mob. Comput., 22 (3): 1536-1550 (марта 2023)LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT., , , , и . IEEE Internet Things J., 7 (9): 7949-7966 (2020)MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors., , , , , и . CoRR, (2020)MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors., , , , , и . IEEE Trans. Computers, 73 (4): 980-993 (апреля 2024)Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT., , , и . Wirel. Commun. Mob. Comput., (2021)