Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixture-Model-Based Graph for Privacy-Preserving Semi-Supervised Learning., , and . IEEE Access, (2020)Mixture distribution modeling for scalable graph-based semi-supervised learning., , , , and . Knowl. Based Syst., (2020)QURG: Question Rewriting Guided Context-Dependent Text-to-SQL Semantic Parsing., , , , , , , and . PRICAI (2), volume 14326 of Lecture Notes in Computer Science, page 275-286. Springer, (2023)Conformal Welding for Brain-Intelligence Analysis., , , , , , and . ISVC (1), volume 11844 of Lecture Notes in Computer Science, page 368-380. Springer, (2019)Revisiting and-inverter cones., , , , , , and . FPGA, page 45-54. ACM, (2014)BSD/I18N - Internationalization of the 4.3BSD UNIX system., , , and . J. Comput. Sci. Technol., 8 (4): 337-346 (1993)Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism., , , , , and . IEEE Access, (2020)AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion., , , , and . DSC, page 420-425. IEEE, (2022)Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder., , and . J. Netw. Comput. Appl., (2021)MT4CrossOIE: Multi-stage Tuning for Cross-lingual Open Information Extraction., , , , , , , , , and 1 other author(s). CoRR, (2023)