Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full-scale Cascade Dynamics Prediction with a Local-First Approach., , , and . CoRR, (2015)GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning., , , , , , , and . CoRR, (2024)Research on Cooperative Packet Forwarding and Punishment Mechanism in Wireless Sensor Networks., , , and . GrC, page 338-342. IEEE Computer Society, (2010)Explainable AI Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks., , , , , , and . CoRR, (2024)Multi-View Low-Rank Coding-Based Network Data De-Anonymization., , , , , and . IEEE Access, (2020)A Game-Theoretic Approach for Distributed Power Control in Wireless Mesh Networks., , and . IEICE Trans. Commun., 94-B (3): 818-822 (2011)Generative Graph Neural Networks for Link Prediction., , , , , , , and . CoRR, (2023)Multiview-Ensemble-Learning-Based Robust Graph Convolutional Networks Against Adversarial Attacks., , , , , , and . IEEE Internet Things J., 11 (16): 27700-27714 (August 2024)Small perturbations are enough: Adversarial attacks on time series prediction., , , , , and . Inf. Sci., (2022)Game Theoretic Approach in Routing Protocol for Cooperative Wireless Sensor Networks., , and . ICSI (2), volume 6729 of Lecture Notes in Computer Science, page 207-217. Springer, (2011)