Author of the publication

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.

, , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 227-239. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Users Based on Behavioral-Modeling across Social Media Sites., , , and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 48-55. Springer, (2014)Synergistic partitioning in multiple large scale social networks., , , , and . IEEE BigData, page 281-290. IEEE Computer Society, (2014)The Sampling Synchronization of the Chaotic System with Different Structures Based on T-S Model., , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 186-194. Springer, (2009)HDGS: A Hybrid Dialogue Generation System using Adversarial Learning., , , , , and . DSC, page 135-141. IEEE, (2019)Research of Trojan Attack Effect Evaluation Based on FAHP., , , , , , and . DSC, page 31-37. IEEE, (2019)Multi-source Knowledge Fusion: A Survey., , , , , , and . DSC, page 119-127. IEEE, (2019)A Framework to Construct Knowledge Base for Cyber Security., , , and . DSC, page 242-248. IEEE Computer Society, (2017)Optimization of process planning for cylinder block based on feature machining elements., , , , , and . SMC, page 2575-2580. IEEE, (2014)Higher Vocational Students' Innovation and Entrepreneurship Ability Demand Prediction., , , , , and . Int. J. Emerg. Technol. Learn., 18 (8): 196-209 (April 2023)Introduction to the MDATA Model., , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)