Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial camouflage for node injection attack on graphs., , , , , , and . Inf. Sci., (November 2023)FCS-HGNN: Flexible Multi-type Community Search in Heterogeneous Information Networks., , , , , , and . CoRR, (2023)Adversarial Camouflage for Node Injection Attack on Graphs., , , , , and . CoRR, (2022)AugSplicing: Synchronized Behavior Detection in Streaming Tensors., , , , , , and . CoRR, (2020)IDEA: Invariant Causal Defense for Graph Adversarial Robustness., , , , , and . CoRR, (2023)Graph Adversarial Immunization for Certifiable Robustness., , , , , and . CoRR, (2023)Learning Content and Context with Language Bias for Visual Question Answering., , , , , and . ICME, page 1-6. IEEE, (2021)Temporal Convolutional Networks for Popularity Prediction of Messages on Social Medias., , , and . CCIR, volume 11772 of Lecture Notes in Computer Science, page 135-147. Springer, (2019)Beyond Outliers and on to Micro-clusters: Vision-Guided Anomaly Detection., , , , , and . PAKDD (1), volume 11439 of Lecture Notes in Computer Science, page 541-554. Springer, (2019)Locate Who You Are: Matching Geo-location to Text for User Identity Linkage., , , , , and . CIKM, page 3413-3417. ACM, (2021)