Author of the publication

High-order Proximity Preserved Embedding For Dynamic Networks

, , , , and . IEEE Transactions on Knowledge and Data Engineering, (2018)
DOI: 10.1109/TKDE.2018.2822283

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Urban Traffic Prediction Through the Second Use of Inexpensive Big Data from Buildings, , , , , and . Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, page 1363--1372. New York, NY, USA, ACM, (2016)ALID: Scalable Dominant Cluster Detection., , , , and . CoRR, (2014)Search and browse log mining for web information retrieval: challenges, methods, and applications., , and . SIGIR, page 912. ACM, (2010)Advances in information and knowledge management., and . SIGIR Forum, 42 (1): 29-35 (2008)Efficient Skyline Querying with Variable User Preferences on Nominal Attributes, , , , , and . CoRR, (2007)Is My Electricity Bill Accurate? A Model-Driven Approach to Corrupted Load Data Identification., , , , and . CoRR, (2013)Accelerated Zeroth-Order and First-Order Momentum Methods from Mini to Minimax Optimization., , , and . J. Mach. Learn. Res., (2022)Link spam target detection using page farms., and . ACM Trans. Knowl. Discov. Data, 3 (3): 13:1-13:38 (2009)Scalable and Accurate Online Feature Selection for Big Data., , , and . ACM Trans. Knowl. Discov. Data, 11 (2): 16:1-16:39 (2016)Can the Utility of Anonymized Data be Used for Privacy Breaches?, , , , and . ACM Trans. Knowl. Discov. Data, 5 (3): 16:1-16:24 (2011)