Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Poisoning Attacks on Graph Convolutional Matrix Completion., , , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 427-439. Springer, (2019)Analog Circuit Incipient Fault Diagnosis Method Using DBN Based Features Extraction., , , and . IEEE Access, (2018)Chinese Event Causality Identification Based on Retrieval Enhancement., , , , , , , and . NLPCC (1), volume 14302 of Lecture Notes in Computer Science, page 159-170. Springer, (2023)SNN-PPRL: A secure record matching scheme based on siamese neural network., , , , , and . J. Inf. Secur. Appl., (August 2023)A Novel Threshold Changeable Secret Image Sharing Scheme., , , , , and . Symmetry, 13 (2): 286 (2021)Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems., , , , , , and . IEICE Trans. Inf. Syst., 105-D (2): 289-299 (2022)DGNN: Dependency Graph Neural Network for Multimodal Emotion Recognition in Conversation., , , , , , and . ICONIP (9), volume 1963 of Communications in Computer and Information Science, page 86-99. Springer, (2023)An Evolutionary Game-Based Mechanism for Unwanted Traffic Control., , , , , and . Recent Trends and Advances in Wireless and IoT-enabled Networks, Springer, (2019)A Group Authentication Scheme Supporting Cheating Detection and Identification., , , and . FCST, page 110-114. IEEE Computer Society, (2015)Correction to: A lossless secret image sharing scheme using a larger finite field., , , , and . Multim. Tools Appl., 81 (21): 31199 (2022)