Author of the publication

AutoCyclone: Automatic Mining of Cyclic Online Activities with Robust Tensor Factorization.

, , and . WWW, page 213-221. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning., , and . CoRR, (2021)Frequency-aware GAN for Adversarial Manipulation Generation., , , and . ICCV, page 4292-4301. IEEE, (2023)A Ranking Method for Web Search Using Social Bookmarks., and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 585-589. Springer, (2009)Construction of Differentially Private Summaries Over Fully Homomorphic Encryption., , , and . DEXA (2), volume 12924 of Lecture Notes in Computer Science, page 9-21. Springer, (2021)Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks.. CoRR, (2020)Top-down itemset recoding for releasing private complex data., , , , , and . PST, page 373-376. IEEE Computer Society, (2013)Federated Graph Analytics with Differential Privacy., , , , , , , and . CoRR, (2024)Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models., , and . CoRR, (2024)Homomorphic Encryption-Friendly Privacy-Preserving Partitioning Algorithm for Differential Privacy., , , and . IEEE Big Data, page 5812-5822. IEEE, (2022)TURank: Twitter User Ranking Based on User-Tweet Graph Analysis., , , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 240-253. Springer, (2010)