Author of the publication

A low-dimensional vector representation for words using an extreme learning machine.

, , , , and . IJCNN, page 1817-1822. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Differentially Private Matrix Factorization Based on ADMM., , , , , and . HPCC/SmartCity/DSS, page 2502-2507. IEEE, (2019)Accelerating Homomorphic Full Adder Based on FHEW Using Multicore CPU and GPUs., , , , , and . HPCC/SmartCity/DSS, page 2508-2513. IEEE, (2019)Effects Analysis of Archetecture Changes to Convolutional Neural Networks., and . SKG, page 98-105. IEEE, (2017)Empirical Analysis of Local Round Trip Time for Wireless Traffic Differentiation., and . QSHINE, volume 74 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-237. Springer, (2010)Bucket Learning: Improving Model Quality through Enhancing Local Patterns., and . ICDM Workshops, page 539-544. IEEE Computer Society, (2009)Anomaly-Based Behavior Analysis of Wireless Network Security., , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2007)Multi-label classification with Bayes' theorem., , and . BMEI, page 2281-2285. IEEE, (2011)Discriminant document embeddings with an extreme learning machine for classifying clinical narratives., , , and . Neurocomputing, (2018)Edge utilization in graph convolutional networks for graph classification., , , and . ICMLA, page 808-813. IEEE, (2022)An efficient network intrusion detection method based on information theory and genetic algorithm., , , and . IPCCC, page 11-17. IEEE, (2005)