Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially private classification with decision tree ensemble., , , and . Appl. Soft Comput., (2018)Social network user influence sense-making and dynamics prediction., , , , , and . Expert Syst. Appl., 41 (11): 5115-5124 (2014)Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System., , , , , and . Neurocomputing, (2016)ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times., , and . J. Grid Comput., 15 (2): 257-272 (2017)A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds., , , and . Future Gener. Comput. Syst., (2017)基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data)., , , , and . 计算机科学, 44 (3): 237-241 (2017)Gaussian Mixture Variational Autoencoder for Semi-Supervised Topic Modeling., , , , and . IEEE Access, (2020)Bandit-based data poisoning attack against federated learning for autonomous driving models., , , , and . Expert Syst. Appl., (October 2023)A Unified Learning Approach for Malicious Domain Name Detection., , , , , , , and . Axioms, 12 (5): 458 (May 2023)FindMal: A file-to-file social network based malware detection framework., , , , and . Knowl. Based Syst., (2016)