Author of the publication

A Link Prediction Approach for Item Recommendation with Complex Number.

, , , , , and . WI-IAT (2), page 205-212. IEEE Computer Society, (2014)978-1-4799-4143-8.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining hidden non-redundant causal relationships in online social networks., , , , and . Neural Comput. Appl., 32 (11): 6913-6923 (2020)Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 170-185 (2018)Sensor-based activity recognition with improved GP-based classifier., , , and . IEEE Congress on Evolutionary Computation, page 3043-3050. IEEE, (2013)The persistence of canards in 3-D singularly perturbed systems with two fast variables., , and . Asymptot. Anal., 47 (1-2): 95-106 (2006)Adaptive subcarrier-distribution algorithm for routing and spectrum allocation in OFDM-based elastic optical networks., , , and . Photonic Netw. Commun., 28 (3): 225-231 (2014)Learning Risky Driver Behaviours from Multi-Channel Data Streams Using Genetic Programming., , , , , and . Australasian Conference on Artificial Intelligence, volume 8272 of Lecture Notes in Computer Science, page 202-213. Springer, (2013)Hybrid network of convolutional neural network and transformer for deepfake geographic image detection., , , , , and . J. Electronic Imaging, (2024)Network Anomalous Attack Detection Based on Clustering and Classifier., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 672-682. Springer, (2006)Optimizing Caching Policy for Loss Recovery in Reliable Multicast., , and . INFOCOM, IEEE, (2006)Detecting Novel Network Attacks with a Data Field., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 66-72. Springer, (2006)