Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frequency distributed model of Caputo derivatives and robust stability of a class of multi-variable fractional-order neural networks with uncertainties., , , and . Neurocomputing, (2016)Semi-Supervised Heterogeneous Graph Learning with Multi-level Data Augmentation., , , , , , , and . CoRR, (2022)Adversarial attack on Speech-to-Text Recognition Models., , and . CoRR, (2019)Adversarial Samples on Android Malware Detection Systems for IoT Systems., , , , and . CoRR, (2019)Poincaré Heterogeneous Graph Neural Networks for Sequential Recommendation., , , , , , , and . CoRR, (2022)A Hybrid Association Rule-Based Method to Detect and Classify Botnets., , , and . Secur. Commun. Networks, (2021)Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats., , , , , and . Sensors, 20 (18): 5297 (2020)Neural Node Matching for Multi-Target Cross Domain Recommendation., , , , , , , and . ICDE, page 2154-2166. IEEE, (2023)Sparse Black-Box Inversion Attack with Limited Information., , , , and . ICASSP, page 1-5. IEEE, (2023)An optimized fusion method for double-wearable-wireless-band platform on remote controller., , , , , , and . ICA, page 90-94. IEEE, (2017)