Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial camouflage for node injection attack on graphs., , , , , , and . Inf. Sci., (November 2023)Learning representations for quality estimation of crowdsourced submissions., , , and . Inf. Process. Manag., 56 (4): 1484-1493 (2019)Towards early identification of online rumors based on long short-term memory networks., , and . Inf. Process. Manag., 56 (4): 1457-1467 (2019)DyTed: Disentangling Temporal Invariance and Fluctuations in Dynamic Graph Representation Learning., , , , , , and . CoRR, (2022)IDEA: Invariant Causal Defense for Graph Adversarial Robustness., , , , , and . CoRR, (2023)Graph Domain Adaptation: Challenges, Progress and Prospects., , , , , and . CoRR, (2024)GCN-ALP: Addressing Matching Collisions in Anchor Link Prediction., , , , and . CoRR, (2021)AI-Generated Images Introduce Invisible Relevance Bias to Text-Image Retrieval., , , , , , and . CoRR, (2023)What makes a successful rebuttal in computer science conferences? : A perspective on social interaction., , , , , and . CoRR, (2023)AugSplicing: Synchronized Behavior Detection in Streaming Tensors., , , , , , and . CoRR, (2020)