Author of the publication

Preparations for Semantics-Based XML Mining.

, , and . ICDM, page 345-352. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks., , and . CCS, page 3387-3389. ACM, (2022)AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention., , , , and . WWW, page 1902-1913. ACM, (2024)Cultural dimensions for user experience: cross-country and cross-product analysis of users' cultural characteristics., , , , , , , , and . BCS HCI (1), page 3-12. BCS, (2008)The Cost Model for XML Documents in Relational Database Systems., , and . AICCSA, page 185-187. IEEE Computer Society, (2001)Filtering XML Target Documents for EDMS., and . ISDB, page 222-227. Acta Press, (2002)Wideband LC VCO with 39.3 % Frequency Tuning Range for Dielectric Spectroscopy System., , , and . ISOCC, page 39-40. IEEE, (2021)Automatic program debugging system for programming language tutoring system., and . CATA, page 50-53. ISCA, (1998)Preparations for Semantics-Based XML Mining., , and . ICDM, page 345-352. IEEE Computer Society, (2001)Object-Oriented Visual Language Grammar and its Parsing Algorithm., and . VL, page 86-87. IEEE Computer Society, (1998)An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)