Author of the publication

Network-Based Feature Extraction Method for Fraud Detection via Label Propagation.

, , , , and . BigComp, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain for Health IoT: A privacy-preserving data sharing system., , , , , and . Softw. Pract. Exp., 52 (9): 2026-2044 (2022)Analysis on Evolution Model of Zombie Company under the Absence of Bank Data., , , and . HICSS, page 1-7. ScholarSpace, (2019)A security assessment method for Android applications based on permission model., , , and . CCIS, page 701-705. IEEE, (2012)Clinical-Coder: Assigning Interpretable ICD-10 Codes to Chinese Clinical Notes., , , , , , , and . ACL (demo), page 294-301. Association for Computational Linguistics, (2020)Which Factors Determine User's First and Repeat Online Music Listening Respectively? Music Itself, User Itself, or Online Feedback., , , , , and . ICIS, Association for Information Systems, (2013)NHFNET: A Non-Homogeneous Fusion Network for Multimodal Sentiment Analysis., , , , , , and . ICME, page 1-6. IEEE, (2022)Are you a local or a visitor?: an exploratory study on consumer behavior in online group buying commerce., , , and . ICEC, page 25:1-25:7. ACM, (2016)An automated estimator for Cobb angle measurement using multi-task networks., , , , and . Neural Comput. Appl., 33 (10): 4755-4761 (2021)Using Dempster-Shafer Evidence Theory for Dialog State Tracking., , , , and . ISCSLP, page 285-289. IEEE, (2018)Neural Network Based Relation Extraction of Enterprises in Credit Risk Management., , , , and . BigComp, page 1-6. IEEE, (2019)