Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially private classification with decision tree ensemble., , , and . Appl. Soft Comput., (2018)Social network user influence sense-making and dynamics prediction., , , , , and . Expert Syst. Appl., 41 (11): 5115-5124 (2014)Gaussian Mixture Variational Autoencoder for Semi-Supervised Topic Modeling., , , , and . IEEE Access, (2020)Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System., , , , , and . Neurocomputing, (2016)基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data)., , , , and . 计算机科学, 44 (3): 237-241 (2017)ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times., , and . J. Grid Comput., 15 (2): 257-272 (2017)A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds., , , and . Future Gener. Comput. Syst., (2017)Bandit-based data poisoning attack against federated learning for autonomous driving models., , , , and . Expert Syst. Appl., (October 2023)CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network., , , , and . IEEE Access, (2019)Intelligent Processing of Intrusion Detection Data., , , , , , and . IEEE Access, (2020)