Author of the publication

Design of the Comprehensive Evaluation Model for Operating Risks of Power Grid Companies in Competitive Environment.

, , and . DPTA, volume 1088 of Advances in Intelligent Systems and Computing, page 1651-1660. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Biogeography-Based Optimization Based on Affinity Propagation., , , , and . ISPRS Int. J. Geo Inf., 5 (8): 129 (2016)A Relation Embedding Assistance Networks for Multi-hop Question Answering., , , , , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 23 (2): 26:1-26:17 (February 2024)Interpretation Technology of the Risk Causes of Management Based on Eigenvalue Disturbance., , and . DPTA, volume 1088 of Advances in Intelligent Systems and Computing, page 1621-1627. Springer, (2019)A dynamic graph expansion network for multi-hop knowledge base question answering., , , , , and . Neurocomputing, (2023)An Extended Multiple Attribute Group Decision Making Method Based on q-Rung Orthopair Fuzzy Numbers., , , and . IEEE Access, (2019)Publisher Correction to: MISR: a multiple behavior interactive enhanced learning model for social-aware recommendation., , , , , and . J. Supercomput., 79 (15): 17758 (October 2023)Multi-feature fused collaborative attention network for sequential recommendation with semantic-enriched contrastive learning., , , , and . Inf. Process. Manag., 60 (5): 103416 (September 2023)Deep boundary-aware clustering by jointly optimizing unsupervised representation learning., , , , and . Multim. Tools Appl., 81 (24): 34309-34324 (2022)CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels., , , , , , , , and . CCS, page 794-810. ACM, (2021)Research on E-mail Filtering Based On Improved Bayesian., , and . J. Comput., 4 (3): 271-275 (2009)