Author of the publication

Social Spammer Detection: A Multi-Relational Embedding Approach.

, , , , and . PAKDD (1), volume 10937 of Lecture Notes in Computer Science, page 615-627. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saturated Throughput and Delay of a Scheduling Scheme in Single-Hop Senario., , and . International Conference on Wireless Networks, page 483-486. CSREA Press, (2004)Major factors of protein evolution revealed by eigenvalue decomposition analysis., , , and . BIOCOMP, page 91-97. CSREA Press, (2008)The Relationship between Regional Intellectual Capital and Regional Innovation Competence: An Empirical Analysis Based on Chongqing City., , and . BIFE, page 425-429. IEEE Computer Society, (2012)Music transcription using an instrument model., , , and . ICASSP (3), page 217-220. IEEE, (2005)Hamiltonian Claw-Free Graphs and o-Heavy Graphs Involving Induced Cycles., , and . Graphs and Combinatorics, 32 (2): 823-833 (2016)An Inverse-Class-F CMOS Oscillator With Intrinsic-High-Q First Harmonic and Second Harmonic Resonances., , , , and . J. Solid-State Circuits, 53 (12): 3528-3539 (2018)Developing a Virtual Reality System to Alleviate Mild Cognitive Impairment in China., , and . AMCIS, Association for Information Systems, (2019)Latent graph-regularized inductive robust principal component analysis., , , , , and . Knowl.-Based Syst., (2019)Kernel Collaborative Representation with Regularized Least Square for Face Recognition., , , and . CCBR, volume 8232 of Lecture Notes in Computer Science, page 130-137. Springer, (2013)Using EDA Tools to Push the Performance Boundaries of an Ultralow-Power IoT-VCO at 65nm., , , , , and . SMACD, page 37-40. IEEE, (2019)