Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying mislabeled training data with the aid of unlabeled data., , , and . Appl. Intell., 35 (3): 345-358 (2011)The small-world trust network., , , and . Appl. Intell., 35 (3): 399-410 (2011)User behavior prediction via heterogeneous information preserving network embedding., , , , and . Future Gener. Comput. Syst., (2019)Socialized healthcare service recommendation using deep learning., , , , and . Neural Comput. Appl., 30 (7): 2071-2082 (2018)Multi-view network embedding with node similarity ensemble., , , , , , and . World Wide Web, 23 (5): 2699-2714 (2020)Transfer learning based attack detection for wireless communication networks., , , , and . Concurr. Comput. Pract. Exp., (2021)Edge-Dual Graph Preserving Sign Prediction for Signed Social Networks., , , and . IEEE Access, (2017)More reputable recommenders give more accurate recommendations?, , , , and . ICUIMC, page 24. ACM, (2013)Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments., , , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 357-360. Springer, (2006)Finding Reliable Recommendations for Trust Model., , , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 375-386. Springer, (2006)