Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Querying Little Is Enough: Model Inversion Attack via Latent Information., , and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 583-591. Springer, (2020)Social Media Sentiment and COVID-19 Transmission: Results from a Time-varying SIR Model., , , and . PACIS, page 31. (2021)A Supervised Link Prediction Method Using Optimized Vertex Collocation Profile., , , and . Entropy, 24 (10): 1465 (2022)Dual-Channel Graph Contextual Self-Attention Network for Session-Based Recommendation., , and . CollaborateCom (1), volume 406 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 244-258. Springer, (2021)Adversarial Example Attacks in the Physical World., and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 572-582. Springer, (2020)PLD-SLAM: A New RGB-D SLAM Method with Point and Line Features for Indoor Dynamic Scene., , , and . ISPRS Int. J. Geo Inf., 10 (3): 163 (2021)Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus., , , , , , , and . Comput. Stand. Interfaces, (2024)A Physically Feasible Counter-Attack Method for Remote Sensing Imaging Point Clouds., , , , , , , and . PRCV (4), volume 14428 of Lecture Notes in Computer Science, page 394-404. Springer, (2023)A preliminary investigation of COVID -19 transmission in the United States by incorporating social media sentiments., , , and . ASIST, volume 57 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)A Survey of Privacy Preserving Subgraph Matching Methods., , , , , , , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 98-113. Springer, (2023)