Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network., , , , , , , , , and . IJCNN, page 1-8. IEEE, (2021)Addressing Misinformation in Online Social Networks: Diverse Platforms and the Potential of Multiagent Trust Modeling., , , , , , , , , and 2 other author(s). Inf., 11 (11): 539 (2020)CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload., , , and . APWeb, volume 4976 of Lecture Notes in Computer Science, page 190-201. Springer, (2008)Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network., , , , , , , , and . CoRR, (2021)Blockchain Topology Optimization Based on Node Clustering., , , , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)e-Health for Older Adults: Navigating Misinformation., , , , , and . ICT4AWE, page 195-202. SCITEPRESS, (2021)uxSense: Supporting User Experience Analysis with Visualization and Computer Vision., , , , and . CoRR, (2023)Improved Carnivorous Plant Algorithm based on Hybrid Strategy and its application., , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)An Optimization Strategy for PBFT Consensus Mechanism Based On Consortium Blockchain., , , , , , and . BSCI, page 71-76. ACM, (2021)An Anomaly Event Detection Method Based on GNN Algorithm for Multi-data Sources., , , , , and . BSCI, page 91-96. ACM, (2021)