Author of the publication

Analyzing the Hidden Causal Interactions in Large-Scale Social Networks: A Case Study on GameStop.

, , , , , and . DTPI, page 294-297. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BioPortal: Sharing and Analyzing Infectious Disease Information., , , , , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 612-613. Springer, (2005)Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients., , , , , and . ISI, page 140-142. IEEE, (2019)Effective Role Resolution in Workflow Management., and . INFORMS J. Comput., 17 (3): 374-387 (2005)Burst Detection From Multiple Data Streams: A Network-Based Approach., , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (3): 258-267 (2010)Inductive Representation Learning on Dynamic Stock Co-Movement Graphs for Stock Predictions., , , , and . INFORMS J. Comput., 34 (4): 1940-1957 (2022)Integrating Deep Learning Approaches for Identifying News Reprint Relation., , , , and . IEEE Access, (2018)Sharing and Visualizing Infectious Disease Datasets Using the WNV-BOT Portal System., , , , , , , and . DG.O, Digital Government Research Center, (2004)Towards A National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism., , , , , , , and . DG.O, Digital Government Research Center, (2004)COPLINK: manging law enforcement data and knowledge., , , , and . Commun. ACM, 46 (1): 28-34 (2003)Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models., , , , and . IEEE Trans. Comput. Soc. Syst., 10 (6): 3241-3251 (December 2023)