From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

同态加密在加密机器学习中的应用研究综述 (Survey on Application of Homomorphic Encryption in Encrypted Machine Learning)., , , , и . 计算机科学, 45 (4): 46-52 (2018)Analysis of the Variance Reduction in SVRG and a New Acceleration Method., , и . IEEE Access, (2018)Transformer for Graphs: An Overview from Architecture Perspective., , , , , , , , , и . CoRR, (2022)Scenario-Adaptive Feature Interaction for Click-Through Rate Prediction., , , , и . KDD, стр. 4661-4672. ACM, (2023)WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method., , , и . MDAI, том 11144 из Lecture Notes in Computer Science, стр. 283-295. Springer, (2018)Neighbour Interaction based Click-Through Rate Prediction via Graph-masked Transformer., , , , , , , , и . SIGIR, стр. 353-362. ACM, (2022)PESTO: A Post-User Fusion Network for Rumour Detection on Social Media., и . WASSA@ACL, стр. 1-10. Association for Computational Linguistics, (2023)Masked Transformer for Neighhourhood-aware Click-Through Rate Prediction., , , , , , , , и . CoRR, (2022)Divide-and-Conquer: Post-User Interaction Network for Fake News Detection on Social Media., , , , , , и . WWW, стр. 1148-1158. ACM, (2022)Variance Reduced Stochastic Optimization for PCA and PLS., , и . ISCID (1), стр. 383-388. IEEE, (2017)