Author of the publication

Rumor detection with self-supervised learning on texts and social graph.

, , , , and . Frontiers Comput. Sci., 17 (4): 174611 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web-Based Semantic Analysis of Chinese News Video., , , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 502-509. Springer, (2006)Deep Model Intellectual Property Protection via Deep Watermarking., , , , , , and . CoRR, (2021)A Spam Filtering Method Based on Multi-modal Features Fusion., , , and . CIS, page 421-426. IEEE Computer Society, (2011)Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement., , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 522-538. Springer, (2022)Graph Anomaly Detection with Bi-level Optimization., , , , , , and . WWW, page 4383-4394. ACM, (2024)Poison Ink: Robust and Invisible Backdoor Attack., , , , , , , and . IEEE Trans. Image Process., (2022)Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication., , , , , and . ACM Multimedia, page 2273-2280. ACM, (2020)Generating Traffic Time Series Based on Generalized Cauchy Process., , and . International Conference on Computational Science (1), volume 4487 of Lecture Notes in Computer Science, page 374-381. Springer, (2007)Threshold Attribute-Based Credentials With Redactable Signature., , , , , , and . IEEE Trans. Serv. Comput., 16 (5): 3751-3765 (September 2023)SED-SGC: A scalable, efficient, and distributed secure group communication scheme based on superlattice PUF., , , , , and . Comput. Networks, (September 2023)