Author of the publication

DUAL: A Deep Unified Attention Model with Latent Relation Representations for Fake News Detection.

, , , , , and . WISE (1), volume 11233 of Lecture Notes in Computer Science, page 199-209. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gray Correlation Model of Enterprise Commercial Credit Risk Assessment.. ICICA (1), volume 391 of Communications in Computer and Information Science, page 519-530. Springer, (2013)Defensor: Lightweight and Efficient Security-Enhanced Framework for Android., , , , and . TrustCom, page 260-267. IEEE Computer Society, (2014)Research of Directed Network Capacity Expansion Based on Spanning Tree Diagram., , , and . ICNC (5), page 69-73. IEEE Computer Society, (2007)Locality-preserving L1-graph and its application in clustering., , , and . SAC, page 813-818. ACM, (2015)Efficient Runtime Generation of Association Rules., , and . CIKM, page 466-473. ACM, (2001)A QA System Based on Bidirectional LSTM with Text Similarity Calculation Model., , , , and . ADHIP, volume 279 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 340-347. Springer, (2018)Global and regional cortical connectivity maturation index (CCMI) of developmental human brain with quantification of short-range association tracts., , , , , , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 9788 of SPIE Proceedings, page 97881B. SPIE, (2016)A Compositional Multiple Policies Operating System Security Model., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 291-302. Springer, (2007)Delineation of early brain development from fetuses to infants with diffusion MRI and beyond., , , , and . NeuroImage, (2019)Understanding Security Vulnerabilities in File Systems., , and . APSys, page 8-15. ACM, (2019)