Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Bluetooth to Enquire Close Contacts Without Privacy Leakage., , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 366-375. Springer, (2020)Feature Selection: A Data Perspective, , , , , , and . ACM Comput. Surv., 50 (6): 94:1--94:45 (December 2017)Semi-supervised anomaly detection in dynamic communication networks., , , , , and . Inf. Sci., (2021)Learning fair models without sensitive attributes: A generative approach., , , and . Neurocomputing, (December 2023)Popularity prediction on vacation rental websites., , , , and . Neurocomputing, (2020)Beyond word2vec: Distance-graph Tensor Factorization for Word and Document Embeddings., , and . CIKM, page 1041-1050. ACM, (2019)Transferring Robustness for Graph Neural Network Against Poisoning Attacks., , , , , and . WSDM, page 600-608. ACM, (2020)Jointly Attacking Graph Neural Network and its Explanations., , , , , , , , , and . CoRR, (2021)You Can Still Achieve Fairness Without Sensitive Attributes: Exploring Biases in Non-Sensitive Features., , , and . CoRR, (2021)Language Models As Semantic Indexers., , , , , , , , , and 3 other author(s). CoRR, (2023)