Author of the publication

Ada: Adversarial learning based data augmentation for malicious users detection.

, , , , , and . Appl. Soft Comput., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Social Recommendation Techniques: A Review., , , , and . ICISO, volume 477 of IFIP Advances in Information and Communication Technology, page 53-58. Springer, (2016)Clustering Algorithm Research Based on Self-organizing Feature Maps Networks., , , , and . IJPRAI, 20 (7): 985-1000 (2006)Energy-Efficient Patching Strategy for Wireless Sensor Networks., , , , , and . Sensors, 19 (2): 262 (2019)A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis., , , , and . Secur. Commun. Networks, (2019)Personalized Recommendation System Based on Support Vector Machine and Particle Swarm Optimization., , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 489-495. Springer, (2015)From Content Text Encoding Perspective: A Hybrid Deep Matrix Factorization Approach for Recommender System., , , and . IJCNN, page 1-8. IEEE, (2019)基于情境相似度和二次聚类的协同过滤推荐算法 (Collaborative Filtering Recommendation Algorithm Based on Context Similarity and Twice Clustering)., , , , and . 计算机科学, 43 (4): 210-213 (2016)基于社交网络用户信任度的混合推荐算法研究 (Hybrid Recommendation Algorithm Based on User's Trust in Social Networks)., , and . 计算机科学, 43 (1): 255-258 (2016)DRL-D: Revenue-Aware Online Service Function Chain Deployment via Deep Reinforcement Learning., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4531-4545 (December 2022)Subtyping brain diseases from imaging data., , , , , , , and . CoRR, (2022)