Author of the publication

Multiscale Evolutionary Perturbation Attack on Community Detection.

, , , , and . IEEE Trans. Comput. Soc. Syst., 8 (1): 62-75 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Find Your Organization in MMORPGs., , , , , , and . IEEE Trans. Games, 14 (3): 446-455 (2022)Subgraph Networks with Application to Structural Feature Space Expansion., , , , , , and . CoRR, (2019)Secure Multi-Party Computation: Theory, practice and applications., , , , , , and . Inf. Sci., (2019)Selection of Landsat-8 Operational Land Imager (OLI) Optimal Band Combinations for Mapping Alteration Zones., , , , and . Remote. Sens., 16 (2): 392 (January 2024)Skeleton-based Action Recognition via Temporal-Channel Aggregation., , , , , and . CoRR, (2022)Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (5): 912-927 (2020)Improved Power Analysis Attack Based on the Preprocessed Power Traces., , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 278-289. Springer, (2016)RL4RS: A Real-World Dataset for Reinforcement Learning based Recommender System., , , , , , , , , and . SIGIR, page 2935-2944. ACM, (2023)Investigating Accuracy-Novelty Performance for Graph-based Collaborative Filtering., , , , , , , , , and . SIGIR, page 50-59. ACM, (2022)Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries., , , , and . Trustcom/BigDataSE/ISPA, page 418-425. IEEE, (2016)