Author of the publication

Temporal Knowledge Graph Embedding for Link Prediction.

, , , , , , and . WISA, volume 13579 of Lecture Notes in Computer Science, page 3-14. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delta-Generalization: High Accuracy Data Release for Privacy Preserving., , , and . Trustcom/BigDataSE/ISPA, page 1861-1866. IEEE, (2016)A Strategy-Proof Combinatorial Auction-Based Grid Resource Allocation System., , , and . ICA3PP, volume 4494 of Lecture Notes in Computer Science, page 254-266. Springer, (2007)Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China., , , and . Remote. Sens., 14 (17): 4308 (2022)RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks., , , , , , , , and . ACM Trans. Archit. Code Optim., 15 (4): 50:1-50:21 (2019)HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption., , , , , , and . IEEE Trans. Parallel Distributed Syst., 34 (4): 1067-1081 (April 2023)Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks., , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (4): 1280-1294 (April 2023)On weighted unbalanced linguistic aggregation operators in group decision making., and . Inf. Sci., (2013)Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations., , , , and . CoRR, (2022)DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection., , , , , , and . Cybersecur., 4 (1): 16 (2021)