From post

Application of Graph Regularized Non-negative Matrix Factorization in Characteristic Gene Selection.

, , , , и . ICIC (2), том 9226 из Lecture Notes in Computer Science, стр. 601-611. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem ., , и . SNPD (3), стр. 1176-1182. IEEE Computer Society, (2007)Jamming-Resilient Message Dissemination in Wireless Networks., , , , , и . IEEE Trans. Mob. Comput., 22 (3): 1536-1550 (марта 2023)Distributed Social Learning With Imperfect Information., , , , , и . IEEE Trans. Netw. Sci. Eng., 8 (2): 841-852 (2021)MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors., , , , , и . IEEE Trans. Computers, 73 (4): 980-993 (апреля 2024)LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT., , , , и . IEEE Internet Things J., 7 (9): 7949-7966 (2020)Distributed optimization for intelligent IoT under unstable communication conditions., , , и . Comput. Commun., (февраля 2023)Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT., , , и . Wirel. Commun. Mob. Comput., (2021)PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks., , , , , , и . Ad Hoc Networks, (2020)CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA., , , , , и . CoRR, (2021)Privacy-aware Data Trading., , , , и . CoRR, (2020)