Author of the publication

Extracting Mutant-Affected Protein-Protein Interactions via Gaussian-Enhanced Representation and Contrastive Learning.

, , , , and . J. Comput. Biol., 30 (9): 972-984 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anonymous Car Rental System Based on NFC., , and . ISBAST, IEEE, (2013)High accuracy and low storage hybrid IP traceback., , , and . CITS, page 1-5. IEEE, (2014)Demonstration of High Endurance Capability on Mega-Bit RRAM Macro and Model of ppm Level Failures., , , , , , , , , and 1 other author(s). VLSI Technology and Circuits, page 318-319. IEEE, (2022)Tracking and identifying a magnetic spheroid target using unscented particle filter., , , and . ICDIP, volume 8009 of SPIE Proceedings, page 800931. SPIE, (2011)Magnetic Field Extrapolation Based on Improved Back Propagation Neural Network., , , , and . AICI (1), volume 6319 of Lecture Notes in Computer Science, page 64-70. Springer, (2010)Hierarchical Neighborhood Based Precise Localization for Intelligent Vehicles in Urban Environments., , , , and . IEEE Trans. Intelligent Vehicles, 1 (3): 220-229 (2016)Research on Energy Interconnection Oriented Big Data Sharing Platform Reference Architecture., , , , and . LSMS/ICSEE (3), volume 763 of Communications in Computer and Information Science, page 217-225. Springer, (2017)In Vitro Identification of Four-Element Windkessel Models Based on Iterated Unscented Kalman Filter., , , , and . IEEE Trans. Biomed. Eng., 58 (9): 2672-2680 (2011)PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks., and . Sensors, 18 (5): 1573 (2018)Pairwise Costs in Semisupervised Discriminant Analysis for Face Recognition., , , and . IEEE Trans. Inf. Forensics Secur., 9 (10): 1569-1580 (2014)