Author of the publication

A Unifying Variational Inference Framework for Hierarchical Graph-Coupled HMM with an Application to Influenza Infection.

, , and . AAAI, page 3828-3834. AAAI Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-based radio frequency identification authentication protocol with location privacy protection., , , and . IJDSN, (2018)Non-Smooth Control of PMSM Position Servo System Based on Model Compensation., , , , and . IECON, page 601-606. IEEE, (2018)Calibration of the VGSSDOption Pricing Model using a Quantum-inspired Evolutionary Algorithm., , , , and . Quantum Inspired Intelligent Systems, volume 121 of Studies in Computational Intelligence, Springer, (2008)An Ensemble Learning Approach to Detect Malwares Based on Static Information., , , , , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 676-686. Springer, (2020)Learning a generative classifier from label proportions., , , , , and . Neurocomputing, (2014)Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm., , , and . GECCO, page 1983-1990. ACM, (2007)Differentially Private Data Releasing for Smooth Queries., , , , , , and . J. Mach. Learn. Res., (2016)RSEL: revocable secure efficient lightweight RFID authentication scheme., , , , , and . Concurr. Comput. Pract. Exp., 26 (5): 1084-1096 (2014)A new proxy blind signature scheme., , and . Int. J. Grid Util. Comput., 3 (1): 38-42 (2012)Mobile ip registration in certificateless public key infrastructure., , , , , and . IET Inf. Secur., 1 (4): 167-173 (2007)