Author of the publication

Role mining based on cardinality constraints.

, , , , , and . Concurr. Comput. Pract. Exp., 27 (12): 3126-3144 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing., , , , , and . IEEE Trans. Cloud Comput., 6 (2): 344-357 (2018)AMNN: Attention-Based Multimodal Neural Network Model for Hashtag Recommendation., , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (3): 768-779 (2020)Optimizing ranking method using social annotations based on language model., , , and . Artif. Intell. Rev., 41 (1): 81-96 (2014)PercolationNET: A multi-tree P2P overlay network supporting high coverage search., , , , and . Int. J. Parallel Emergent Distributed Syst., 25 (1): 73-89 (2010)LIMTopic: A Framework of Incorporating Link Based Importance into Topic Modeling., , , , , and . IEEE Trans. Knowl. Data Eng., 26 (10): 2493-2506 (2014)Optimizing Academic Conference Classification Using Social Tags., , , and . CSE, page 289-294. IEEE Computer Society, (2010)Hashtag Recommendation with Attention-Based Neural Image Hashtagging Network., , , , , and . ICONIP (2), volume 11302 of Lecture Notes in Computer Science, page 52-63. Springer, (2018)Stock Price Prediction Using Time Convolution Long Short-Term Memory Network., , , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 461-468. Springer, (2018)Semantic SPARQL Query in a Relational Database Based on Ontology Construction., , , , and . SKG, page 25-32. IEEE Computer Society, (2015)SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method., , , , , and . Secur. Commun. Networks, (2019)