Author of the publication

Joint local structure preservation and redundancy minimization for unsupervised feature selection.

, , , , and . Appl. Intell., 50 (12): 4394-4411 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic pricing considering strategic customers.. LISS, page 1-5. IEEE, (2016)Sentiment Analysis Based on Weighted Word2vec and Att-LSTM., , , and . CSAI/ICIMT, page 420-424. ACM, (2018)A decomposition method for large-scale box constrained optimization., , , and . Appl. Math. Comput., (2014)Dynamics analysis of a novel 5-DoF parallel manipulator with couple-constrained wrench., , , , and . Robotica, 36 (10): 1421-1435 (2018)Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization., and . Wirel. Networks, 18 (3): 307-318 (2012)A Large-Update Primal-Dual Interior-Point Method for Second-Order Cone Programming., , , and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 102-109. Springer, (2010)Robust PCA Using Matrix Factorization for Background/Foreground Separation., , , , , and . IEEE Access, (2018)An efficient privacy-preserving data query and dissemination scheme in vehicular cloud., , , , , and . Pervasive Mob. Comput., (2020)Matrix Factorization for User Behavior Analysis of Location-Based Social Network., , and . WISE Workshops, volume 8182 of Lecture Notes in Computer Science, page 84-97. Springer, (2013)A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies., , , , , , and . Entropy, 23 (5): 529 (2021)