Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost-Effective Active Learning from Diverse Labelers., , , and . IJCAI, page 1879-1885. ijcai.org, (2017)Multi-Instance Learning With Emerging Novel Class., , , , , and . IEEE Trans. Knowl. Data Eng., 33 (5): 2109-2120 (2021)Classification Under Streaming Emerging New Classes: A Solution Using Completely-Random Trees., , and . IEEE Trans. Knowl. Data Eng., 29 (8): 1605-1618 (2017)Classification under Streaming Emerging New Classes: A Solution using Completely Random Trees., , and . CoRR, (2016)User Identity Linkage by Latent User Space Modelling., , , , , and . KDD, page 1775-1784. ACM, (2016)Unsupervised User Identity Linkage via Factoid Embedding., , , , and . ICDM, page 1338-1343. IEEE Computer Society, (2018)Strongly nonoutsourceable scratch-off puzzles in blockchain., , , , and . Soft Comput., 27 (17): 11941-11960 (2023)Receiver selective opening security for identity-based encryption in the multi-challenge setting., , , and . Des. Codes Cryptogr., 91 (4): 1233-1259 (April 2023)Data Pricing and Data Asset Governance in the AI Era., , , , , and . KDD, page 4058-4059. ACM, (2021)EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection., , , , , , and . AAAI, page 21438-21445. AAAI Press, (2024)