Author of the publication

PersonalityGate: A general plug-and-play GNN gate to enhance cascade prediction with personality recognition task.

, , , , and . Expert Syst. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks., , , , and . IEEE Internet of Things Journal, 7 (4): 3462-3473 (2020)Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2805-2818 (2019)A New AES S-Box Equation System Based on BES., , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1177-1184 (2015)Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2988-3001 (July 2023)PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 722-735 (2021)Multi-factor based session secret key agreement for the Industrial Internet of Things., , , , , and . Ad Hoc Networks, (2023)Decomposition and Composition of Sequence Diagrams., , and . TASE, page 76-83. IEEE Computer Society, (2018)TCNN: Two-Way Convolutional Neural Network for Image Steganalysis., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 509-514. Springer, (2020)Accelerating Knuth-Morris-Pratt String Matching over LZ77 Compressed Text., , , , and . DCC, page 372. IEEE, (2021)Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks., , , , , and . WASA (3), volume 13473 of Lecture Notes in Computer Science, page 249-260. Springer, (2022)