Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chapter One - A Deep-forest based approach for detecting fraudulent online transaction., , , , , and . Adv. Comput., (2021)Integration of Link and Semantic Relations for Information Recommendation., , , , , and . Comput. Informatics, 35 (1): 30-54 (2016)Orientation Analysis for Chinese News Based on Word Embedding and Syntax Rules., , , , and . IEEE Access, (2019)Makespan-Driven Workflow Scheduling in Clouds Using Immune-Based PSO Algorithm., , , and . IEEE Access, (2020)A General Construction for 1-Round δ-RMT and (0, δ)-SMT., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 344-362. Springer, (2012)Concept and Attention-Based CNN for Question Retrieval in Multi-View Learning., , , , , , and . ACM Trans. Intell. Syst. Technol., 9 (4): 41:1-41:24 (2018)A Model for Adversarial Wiretap Channels., and . IEEE Trans. Inf. Theory, 62 (2): 970-983 (2016)Adversarial Wiretap Channel with Public Discussion., and . CoRR, (2014)一种基于社区分类的社交网络用户推荐方法 (Novel Method on Community-based User Recommendation on Social Network)., , and . 计算机科学, 43 (5): 198-203 (2016)An Adaptive Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data., , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 813-825. Springer, (2023)