Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Review Content for Recommendation via Latent Factor Model., , , and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 668-679. Springer, (2014)4-Bit Optimized Coding Metasurface for Wideband RCS Reduction., , , , and . IEEE Access, (2019)MATRI: a multi-aspect and transitive trust inference model., , , , and . WWW, page 1467-1476. International World Wide Web Conferences Steering Committee / ACM, (2013)Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 349-360. Springer, (2017)An Effective Approach for Routing the Bug Reports to the Right Fixers., , , , and . Internetware, page 11:1-11:10. ACM, (2018)Verification and application of discrete-time ZD with cube characteristics for solving the system of time-varying nonlinear equations., , and . ICACI, page 685-691. IEEE, (2018)Assessment on uncertainty of multi-scale representation of point cluster., , and . Geoinformatics, page 1-6. IEEE, (2010)Invariant Set-Based Analysis of Minimal Detectable Fault for Discrete-Time LPV Systems With Bounded Uncertainties., , , , and . IEEE Access, (2019)Online subspace and sparse filtering for target tracking in reverberant environment., , and . SAM, page 329-332. IEEE, (2012)A novel approach for hiding sensitive utility and frequent itemsets., , and . Intell. Data Anal., 22 (6): 1259-1278 (2018)