Author of the publication

Confidence-guided Boundary Adaption Network for Multimodal Fake News Detection.

, , , , , and . MMAsia, page 77:1-77:7. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facile Wettability-Patterned Flexible Surface for Multifunctional Microdroplet Array Manipulation., , and . NEMS, page 157-161. IEEE, (2022)Deep Space Relay Resource Planning Model Based on Sliding Time Window., , , , , , and . ICICT, page 181-186. IEEE, (2021)Cloud Workflow Scheduling with Deadlines and Time Slot Availability., , and . IEEE Trans. Serv. Comput., 11 (2): 329-340 (2018)Some Notes on the Generalized Cyclotomic Binary Sequences of Length 2pm and pm., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (10): 2049-2051 (2013)An enhanced greedy random adaptive search procedure with path-relinking for no-wait flowshop problem with setup times., and . Integr. Comput. Aided Eng., 23 (1): 51-68 (2016)Object technology software selection: a case study., and . Ann. Oper. Res., 185 (1): 5-24 (2011)Centroid Coordinate Ranking of Pythagorean Fuzzy Numbers and its Application in Group Decision Making., , and . Cogn. Comput., 14 (2): 602-623 (2022)Short-Frame Fountain Code for Plasma Sheath With "Communication Windows"., , , , and . IEEE Trans. Veh. Technol., 69 (12): 15569-15579 (2020)Hybrid Heuristic for m-Machine No-Wait Flowshops to Minimize Total Completion Time., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 192-203. Springer, (2007)A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares., , , and . IEEE Access, (2019)