Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstracting massive data for lightweight intrusion detection in computer networks., , , and . Inf. Sci., (2018)Toward autonomic grids: analyzing the job flow with affinity streaming., , , , and . KDD, page 987-996. ACM, (2009)Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 82-97. Springer, (2011)Improving Cross-lingual Entity Alignment via Optimal Transport., , and . IJCAI, page 3231-3237. ijcai.org, (2019)A Privacy-Preserving Framework for Trust-Oriented Point-of-Interest Recommendation., , , , , , and . IEEE Access, (2018)A Novel Framework for Node/Edge Attributed Graph Embedding., and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 169-182. Springer, (2019)Jointly Learning Representations of Nodes and Attributes for Attributed Networks., , , , and . ACM Trans. Inf. Syst., 38 (2): 16:1-16:32 (2020)Understanding and analyzing network traffic., , , , and . IEEE Netw., 26 (1): 4-5 (2012)Precise Target Selection Techniques in Handheld Augmented Reality Interfaces., , , and . IEEE Access, (2019)SeqST-ResNet: A Sequential Spatial Temporal ResNet for Task Prediction in Spatial Crowdsourcing., , , , and . DASFAA (1), volume 11446 of Lecture Notes in Computer Science, page 260-275. Springer, (2019)