Author of the publication

DMIL-III: Isoform-isoform interaction prediction using deep multi-instance learning method.

, , , , and . BIBM, page 171-176. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Framework for Node/Edge Attributed Graph Embedding., and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 169-182. Springer, (2019)Processing of massive audit data streams for real-time anomaly intrusion detection., , and . Comput. Commun., 31 (1): 58-72 (2008)A Privacy-Preserving Framework for Trust-Oriented Point-of-Interest Recommendation., , , , , , and . IEEE Access, (2018)Abstracting massive data for lightweight intrusion detection in computer networks., , , and . Inf. Sci., (2018)Toward autonomic grids: analyzing the job flow with affinity streaming., , , , and . KDD, page 987-996. ACM, (2009)Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 82-97. Springer, (2011)Improving Cross-lingual Entity Alignment via Optimal Transport., , and . IJCAI, page 3231-3237. ijcai.org, (2019)Co-Embedding Attributed Networks., , , and . WSDM, page 393-401. ACM, (2019)Jointly Learning Representations of Nodes and Attributes for Attributed Networks., , , , and . ACM Trans. Inf. Syst., 38 (2): 16:1-16:32 (2020)Understanding and analyzing network traffic., , , , and . IEEE Netw., 26 (1): 4-5 (2012)