From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malicious SIM Cards Identification Method Based on Telecom Big Data Analytics., , , , , , и . ICCDE, стр. 136-141. ACM, (2020)Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning., , , , , , , и . CoRR, (2024)A study on smart city research activity using bibliometric and natural language processing methods., , и . ICIT, стр. 346-352. ACM, (2021)A map matching method for restoring movement routes with cellular signaling data., , и . ICIT, стр. 94-99. ACM, (2020)MIED : An Improved Graph Neural Network for Node Embedding in Heterogeneous Graphs., , , , , , , , , и . EAI Endorsed Trans. Scalable Inf. Syst., (2023)D-AE: A Discriminant Encode-Decode Nets for Data Generation., , , , , , , , и . CollaborateCom (2), том 562 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 96-114. Springer, (2023)PAGAE: Improving Graph Autoencoder by Dual Enhanced Adversary., , , , , , и . CogSci, cognitivesciencesociety.org, (2023)Pessimistic Adversarially Regularized Learning for Graph Embedding., , , , , , и . ADMA (3), том 14178 из Lecture Notes in Computer Science, стр. 338-351. Springer, (2023)A Blockchain Based Trustworthy Space in Cross-Domain Synergy., , , , , и . Blockchain, стр. 203-208. IEEE, (2023)