Author of the publication

Inference for Network Structure and Dynamics from Time Series Data via Graph Neural Network.

, , , , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Support Vector Machine and Its Application to Mechanical Condition Monitoring., , and . ISNN (1), volume 3496 of Lecture Notes in Computer Science, page 937-942. Springer, (2005)Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 219-234. Springer, (2015)Navigation-Oriented Topological Model Construction Algorithm for Complex Indoor Space., , , , and . ISPRS Int. J. Geo Inf., 12 (6): 248 (June 2023)Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System., , and . IEEE Multim., 29 (1): 74-84 (2022)Preventing Overshadowing Attacks in Self-Jamming Audio Channels., , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 45-57 (2021)A phased vehicles evacuation planning method for disasters with time-dependent traffic demand., , , , and . Geoinformatics, page 1-7. IEEE, (2022)The Ground Motion Dynamics Analysis of a Bionic Amphibious Robot with Undulatory Fins., , , , and . RCAR, page 1385-1390. IEEE, (2021)Sparsity-Based Processing to Enhance the Reverberation Suppression for FDA-MIMO Sonars., , , and . IEEE Trans. Aerosp. Electron. Syst., 60 (2): 1556-1569 (2024)HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput., , , , , , and . IEEE Trans. Computers, 73 (6): 1575-1587 (June 2024)A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement., , , and . IEEE Trans. Ind. Informatics, 16 (1): 691-702 (2020)