Author of the publication

User behavior prediction via heterogeneous information preserving network embedding.

, , , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SFPAG-R: A Reliable Routing Algorithm Based on Sealed First-Price Auction Games for Industrial Internet of Things Networks., , , , and . IEEE Trans. Veh. Technol., 70 (5): 5016-5027 (2021)Multi-AUV Collaborative Data Collection Algorithm Based on Q-Learning in Underwater Acoustic Sensor Networks., , , , and . IEEE Trans. Veh. Technol., 70 (9): 9294-9305 (2021)Impacts of Deployment Strategies on Localization Performance in Underwater Acoustic Sensor Networks., , , and . IEEE Trans. Ind. Electron., 62 (3): 1725-1733 (2015)Partial offloading strategy for mobile edge computing considering mixed overhead of time and energy., , , , and . Neural Comput. Appl., 32 (19): 15383-15397 (2020)A Novel Reliable Adaptive Beacon Time Synchronization Algorithm for Large-Scale Vehicular Ad Hoc Networks., , and . IEEE Trans. Veh. Technol., 68 (12): 11565-11576 (2019)Improved Doppler Shift Estimation Algorithm for Down-Link Signals of Space-Based AIS., , , , and . IEEE Trans. Veh. Technol., 70 (10): 11028-11032 (2021)A Distributed Mobile Fog Computing Scheme for Mobile Delay-Sensitive Applications in SDN-Enabled Vehicular Networks., , , , and . IEEE Trans. Veh. Technol., 69 (5): 5481-5493 (2020)A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks., , , , and . IEEE Trans. Mob. Comput., 21 (3): 811-821 (2022)ITrust: An Anomaly-Resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks., , , and . IEEE Trans. Mob. Comput., 21 (5): 1684-1696 (2022)A source location privacy protection scheme based on ring-loop routing for the IoT., , , , and . Comput. Networks, (2019)