Author of the publication

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.

, , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 227-239. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-source knowledge fusion: a survey., , , , and . World Wide Web, 23 (4): 2567-2592 (2020)Higher Vocational Students' Innovation and Entrepreneurship Ability Demand Prediction., , , , , and . Int. J. Emerg. Technol. Learn., 18 (8): 196-209 (April 2023)Target relational attention-oriented knowledge graph reasoning., , , , , and . Neurocomputing, (2021)MILDMS: Multiple Instance Learning via DD Constraint and Multiple Part Similarity., , , , and . Symmetry, 11 (9): 1080 (2019)A method for achieving provable data integrity in cloud computing., , and . J. Supercomput., 75 (1): 92-108 (2019)Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors., , , , , and . DSC, page 1-7. IEEE, (2020)A structure free self-adaptive piecewise hashing algorithm for spam filtering., , and . ICIMCS, page 335-340. ACM, (2013)Functional immunization of networks based on message passing., , , , , and . Appl. Math. Comput., (2020)Optimisation of line configuration and balancing for reconfigurable transfer lines considering demand uncertainty., , and . Int. J. Prod. Res., 59 (2): 444-466 (2021)A survey on cybersecurity knowledge graph construction., , , , and . Comput. Secur., (January 2024)