Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features., , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 588-604. Springer, (2019)Byzantine-Robust Federated Learning via Credibility Assessment on Non-IID Data., , , and . CoRR, (2021)A Multi-Candidate Batch Mode Active Learning Approach., , and . ICMLC, page 528-533. ACM, (2023)FedDDB: Clustered Federated Learning based on Data Distribution Difference., , , and . ACAI, page 73:1-73:6. ACM, (2022)A hybrid method of recommending POIs based on context and personal preference confidence., , , and . BDCAT, page 287-292. ACM, (2016)MUSH: Multi-scale Hierarchical Feature Extraction for Semantic Image Synthesis., , , , and . ACCV (7), volume 13847 of Lecture Notes in Computer Science, page 185-201. Springer, (2022)Benchmark Datasets for Stochastic Petri Net Learning., , , , and . IJCNN, page 1-8. IEEE, (2021)Checking the Inconsistent Data in Concurrent Systems by Petri Nets with Data Operations., , , and . ICPADS, page 501-508. IEEE Computer Society, (2016)A new credit card fraud detecting method based on behavior certificate., , , , , , and . ICNSC, page 1-6. IEEE, (2018)Non-Autoregressive Neural Machine Translation with Consistency Regularization Optimized Variational Framework., , and . NAACL-HLT, page 607-617. Association for Computational Linguistics, (2022)