Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems., , , , and . ACM Trans. Embed. Comput. Syst., 16 (4): 106:1-106:24 (2017)Defense Against Model Extraction Attacks on Recommender Systems., , , and . CoRR, (2023)Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching., , , , , and . CoRR, (2022)Heterogeneous Hypergraph Embedding for Graph Classification., , , , , , and . CoRR, (2020)Graph representation learning with attribute information. University of Queensland, Australia, (2020)S-looper: automatic summarization for multipath string loops., , , , and . ISSTA, page 188-198. ACM, (2015)Defense Against Model Extraction Attacks on Recommender Systems., , , and . WSDM, page 949-957. ACM, (2024)Unsupervised Group Re-identification via Adaptive Clustering-Driven Progressive Learning., , , and . AAAI, page 1054-1062. AAAI Press, (2024)Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions., , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 121-127. Springer, (2018)Exploiting Centrality Information with Graph Convolutions for Network Representation Learning., , , , , and . ICDE, page 590-601. IEEE, (2019)