Author of the publication

Serendipitous Personalized Ranking for Top-N Recommendation.

, , , , and . Web Intelligence, page 258-265. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Making the Most of BERT in Neural Machine Translation., , , , , , and . AAAI, page 9378-9385. AAAI Press, (2020)Learning Decomposed Spatial Relations for Multi-Variate Time-Series Modeling., , , , , , , and . AAAI, page 7530-7538. AAAI Press, (2023)Efficient E-coupon systems with strong user privacy., , , and . Telecommun. Syst., 64 (4): 695-708 (2017)Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications., , and . Comput. J., 62 (4): 631-640 (2019)Efficient Identity-Based Signcryption Scheme for Multiple Receivers., , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 13-21. Springer, (2007)Wind Tunnel Test Research on the Flight Style of Ski Jumping., , , and . IPEC, page 557-562. ACM, (2022)Adaptive Control Strategy for Quadruped Robots in Actuator Degradation Scenarios., , , , and . DAI, page 14:1-14:13. ACM, (2023)IMAP: An iterative method for aligning protein-protein interaction networks., , , and . BIBM, page 317-324. IEEE Computer Society, (2017)Efficient and Robust Emergence of Conventions through Learning and Staying., , , , , and . ICA, page 14-19. IEEE, (2019)Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual., , , , , and . AsiaCCS, page 859-871. ACM, (2021)