Author of the publication

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.

, , , , , and . CIKM, page 801-809. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Filtering for DDL-Based Service Composition., , , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 778-787. Springer, (2008)Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks., , , , , , and . J. Netw. Comput. Appl., (2014)Tolerance granular computing towards incomplete information system., , , and . Int. J. Granul. Comput. Rough Sets Intell. Syst., 2 (1): 10-22 (2011)Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding., , , , , , , , , and . Int. J. Intell. Syst., 36 (5): 2323-2346 (2021)Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems., , , , , , and . IEEE Access, (2017)Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View., , , , , , , , and . J. Comput. Sci. Technol., 36 (5): 1002-1021 (2021)A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning., , , , and . J. Circuits Syst. Comput., 30 (13): 2150229:1-2150229:21 (2021)Curbing collusive cyber-gossips for business brand management., , , , and . Enterp. Inf. Syst., 11 (10): 1457-1461 (2017)Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization., , , , , , and . J. Netw. Comput. Appl., (2014)Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack., , , , , , , and . Inscrypt, volume 12612 of Lecture Notes in Computer Science, page 37-52. Springer, (2020)