Author of the publication

Improving Knowledge Graph Embedding Using Dynamic Aggregation of Neighbor Information.

, , , , , and . ICONIP (4), volume 1791 of Communications in Computer and Information Science, page 513-525. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Gallery-Guided Graph Architecture for Sequential Impurity Detection., , , , , , and . IEEE Access, (2019)RotatGAT: Learning Knowledge Graph Embedding with Translation Assumptions and Graph Attention Networks., , , , , and . IJCNN, page 1-7. IEEE, (2022)Graph Convolutional Neural Network Based on Channel Graph Fusion for EEG Emotion Recognition., , and . ICONIP (5), volume 1792 of Communications in Computer and Information Science, page 243-254. Springer, (2022)Improving Knowledge Graph Embedding Using Dynamic Aggregation of Neighbor Information., , , , , and . ICONIP (4), volume 1791 of Communications in Computer and Information Science, page 513-525. Springer, (2022)Research on Denoising Algorithms and Corner Detection of Dangerous Chemicals Storage and Stacking Based on Generative Adversarial Networks., , , , , , and . CCIS, page 200-206. IEEE, (2019)Towards automatic detection of erroneous measurement results in a gravity database., , , , and . SMC, page 2170-2175. IEEE, (2001)A Transformer-Based Network for Deformable Medical Image Registration., , , and . CICAI (1), volume 13604 of Lecture Notes in Computer Science, page 502-513. Springer, (2022)A Model for Detecting Malware Adversarial Samples Based on Anomaly Detection Technology., , and . AHPCAI, volume 3331 of CEUR Workshop Proceedings, page 75-84. CEUR-WS.org, (2022)A Study of Agricultural Zoning of Huang-Huai-Hai Plain Based on GIS., , , , , , and . CCTA (2), volume 393 of IFIP Advances in Information and Communication Technology, page 84-91. Springer, (2012)A Malware Family Classification Method Based on the Point Cloud Model DGCNN., , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 210-221. Springer, (2021)