Author of the publication

GLAD: Graph-Based Long-Term Attentive Dynamic Memory for Sequential Recommendation.

, , and . ECIR (3), volume 14610 of Lecture Notes in Computer Science, page 72-88. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRYPTANALYSIS OF KEY EXCHANGE METHOD USING COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER PERCEPTRON IN WIRELESS COMMUNICATION (CKEMLP), and . Advanced Computational Intelligence: An International Journal (ACII), 1 (1): 01-09 (July 2014)Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence., , , and . IEEE Access, (2024)Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19., and . Multim. Tools Appl., 80 (14): 21899-21923 (2021)CRYPTANALYSIS OF KEY EXCHANGE METHOD USING COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER PERCEPTRON IN WIRELESS COMMUNICATION. Advanced Computational Intelligence: An International Journal (ACII), 1 (1): 01-09 (July 2014)KSOFM Network Based Neural Key Generation for Wireless Communication., , , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 207-215. Springer, (2014)Graph Representation Learning via Ladder Gamma Variational Autoencoders., , and . AAAI, page 5604-5611. AAAI Press, (2020)Neuro-key Generation Based on HEBB Network for Wireless Communication., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 197-205. Springer, (2014)DAM: Deadblock Aware Migration Techniques for STT-RAM-Based Hybrid Caches., , , and . IEEE Comput. Archit. Lett., 20 (1): 62-65 (2021)An efficient deep learning-based solution for network intrusion detection in wireless sensor network., , and . Int. J. Syst. Assur. Eng. Manag., 14 (6): 2423-2446 (December 2023)Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in Industrial Internet of Things., , and . Eng. Appl. Artif. Intell., 123 (Part B): 106357 (2023)