Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Transfer for Out-of-Knowledge-Base Entities: Improving Graph-Neural-Network-Based Embedding Using Convolutional Layers., , , and . IEEE Access, (2020)Maximum-Throughput Sidelink Resource Allocation for NR-V2X Networks With the Energy-Efficient CSI Transmission., , , and . IEEE Access, (2020)Molecular dynamics simulations reveal the allosteric effect of F1174C resistance mutation to ceritinib in ALK-associated lung cancer., , , and . Comput. Biol. Chem., (2016)Empirical Analysis of Attribute Inference Techniques in Online Social Network., , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 881-893 (2021)IFGAN: Information fusion generative adversarial network for knowledge base completion., , , and . Expert Syst. J. Knowl. Eng., (2022)Identifying Child Users via Touchscreen Interactions., , , , , , and . ACM Trans. Sens. Networks, 16 (4): 35:1-35:25 (2020)Dynamic Aging Weight Scheme for Trust Model in Internet of Medical Things., , , , , , , , and . BIBM, page 3366-3369. IEEE, (2021)The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1108-1124 (2021)Cyber-Attack Classification in Smart Grid via Deep Neural Network., , , , , and . CSAE, page 90:1-90:5. ACM, (2018)DolphinAtack: Inaudible Voice Commands., , , , , and . CoRR, (2017)