Author of the publication

A competitive model of popularity prediction using correlation matrix.

, , , and . Clust. Comput., 22 (Supplement): 2747-2759 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Syntactic Structure to Semantic Relationship: Hypernym Extraction from Definitions by Recurrent Neural Networks Using the Part of Speech Information., , and . ISWC (1), volume 12506 of Lecture Notes in Computer Science, page 529-546. Springer, (2020)A Survey on Deep Learning-Based Source Code Defect Analysis., , , , and . ICCCS, page 167-171. IEEE, (2020)Design of Educational Interactive Teaching Aids for Children Based on the Art of Chinese Character Structure., , , , and . HCI (54), volume 14060 of Lecture Notes in Computer Science, page 369-381. Springer, (2023)Independent Asymmetric Embedding for Information Diffusion Prediction on Social Networks., , and . CSCWD, page 190-195. IEEE, (2022)On subgroup regular sets in Cayley sum graphs., and . Discret. Math., 347 (9): 114059 (2024)Design Pattern Representation and Detection Based on Heterogeneous Information Network., , and . ICSR, volume 14614 of Lecture Notes in Computer Science, page 72-91. Springer, (2024)Regular sets in circulant graphs with degree 3., and . Discret. Appl. Math., (2024)Independent Perfect Domination Sets in Semi-Cayley Graphs., , and . AAIM, volume 12290 of Lecture Notes in Computer Science, page 436-447. Springer, (2020)CasSeqGCN: Combining network structure and temporal sequence to predict information cascades., , , , and . Expert Syst. Appl., (2022)Mining String Feature for Malicious Binary Detection Based on Normalized CNN., , , , and . ICCCS, page 748-752. IEEE, (2021)