Author of the publication

Multi-timescale History Modeling for Temporal Knowledge Graph Completion.

, , , , , and . MSN, page 477-484. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BSB: Bringing Safe Browsing to Blockchain Platform., , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 524-543. Springer, (2022)A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection., , , , , and . Int. J. Intell. Syst., (2023)TxMirror: When the Dynamic EVM Stack Meets Transactions for Smart Contract Vulnerability Detection., , , and . Symmetry, 15 (7): 1345 (July 2023)Retrofitting LBR Profiling to Enhance Virtual Machine Introspection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Semi-RainGAN: A Semisupervised Coarse-to-Fine Guided Generative Adversarial Network for Mixture of Rain Removal., , , and . Symmetry, 15 (10): 1832 (October 2023)ImLiDAR: Cross-Sensor Dynamic Message Propagation Network for 3-D Object Detection., , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature., , , and . CSE (2), page 721-726. IEEE Computer Society, (2009)Controlled Channel Attack Detection Based on Hardware Virtualization., , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 406-420. Springer, (2018)Real-Time Prediction of Welding Penetration Mode and Depth Based on Visual Characteristics of Weld Pool in GMAW Process., , , and . IEEE Access, (2020)GANAD: A GAN-based method for network anomaly detection., , , , and . World Wide Web (WWW), 26 (5): 2727-2748 (September 2023)