Author of the publication

Time-Aware Context-Gated Graph Attention Network for Clinical Risk Prediction.

, , , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (7): 7557-7568 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decreased vegetation growth in response to summer drought in Central Asia from 2000 to 2012., , and . Int. J. Appl. Earth Obs. Geoinformation, (2016)Passivity and Finite-Time Passivity for Multi-Weighted Fractional-Order Complex Networks With Fixed and Adaptive Couplings., , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (2): 894-908 (February 2023)Analysis and adaptive control for synchronization and H∞ synchronization of coupled partial differential systems with multiple time-varying delays., , , and . J. Frankl. Inst., 355 (10): 4351-4378 (2018)Finite-time passivity of multiple weighted coupled uncertain neural networks with directed and undirected topologies., , , and . Neurocomputing, (2019)Telerehabilitation Approaches for Stroke Patients: Systematic Review and Meta-analysis of Randomized Controlled Trials, , , , , and . Journal of Stroke and Cerebrovascular Diseases, 24 (12): 2660 - 2668 (2015)BIGSIR: A Bipartite Graph Based Service Recommendation Method., , , and . SERVICES, page 363-369. IEEE Computer Society, (2013)Research and Analysis of Ajax Technology Effect on Information System Operating Efficiency., , and . CONFENIS (1), volume 254 of IFIP, page 641-649. Springer, (2007)Matrix Passwords: A Proposed Methodology of Password Authentication., and . AMCIS, Association for Information Systems, (2012)Identification of core-periphery structure in networks., , and . CoRR, (2014)Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes)., , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 223-241. Springer, (2017)