Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The relational governance antecedents and loyalty consequence of service quality in crowdsourcing: The moderating role of crowdsourcing experience., , , and . Telematics Informatics, (2020)Decoding functional cell-cell communication events by multi-view graph learning on spatial transcriptomics., , , , , , and . Briefings Bioinform., (September 2023)JEBIN: analyzing gene co-expressions across multiple datasets by joint network embedding., , , , , , and . Briefings Bioinform., (2022)TextGuard: Provable Defense against Backdoor Attacks on Text Classification., , , , and . CoRR, (2023)Robust saliency maps with decoy-enhanced saliency score., , , and . CoRR, (2020)Location Error Analysis for Collaborative Beamforming in UAVs Random Array., , , , and . IEEE Wirel. Commun. Lett., 13 (3): 904-907 (March 2024)Comprehensive Effects of Imperfect Synchronization and Channel Estimation on Known Interference Cancellation., , , , and . IEEE Trans. Veh. Technol., 69 (1): 457-470 (2020)HackerRank: Identifying key hackers in underground forums., , , and . Int. J. Distributed Sens. Networks, 17 (5): 155014772110151 (2021)An Empirical Study of Malicious Code In PyPI Ecosystem., , , , , and . ASE, page 166-177. IEEE, (2023)EDGE: Explaining Deep Reinforcement Learning Policies., , , and . NeurIPS, page 12222-12236. (2021)