Author of the publication

A Discussion on Personalized Trust Management for Flat P2P Communities.

, , and . SITIS, page 193-199. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Inner-Connection of Message Sequence for Traffic Classification: A Deep Learning Approach., , , , , and . ICPADS, page 77-84. IEEE, (2018)An modularity-based overlapping community structure detecting algorithm., , , and . ASONAM, page 113-117. IEEE Computer Society, (2014)A global and local context integration DCNN for adult image classification., , , , and . Pattern Recognition, (2019)Dynamic Label Correction for Distant Supervision Relation Extraction via Semantic Similarity., , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 16-27. Springer, (2019)Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis., , , and . IEEE Trans. Information Forensics and Security, (2020)Transformer-DW: A Transformer Network with Dynamic and Weighted Head., , , and . ICONIP (2), volume 11954 of Lecture Notes in Computer Science, page 504-515. Springer, (2019)Multiple Character Embeddings for Chinese Word Segmentation., , and . ACL (2), page 210-216. Association for Computational Linguistics, (2019)LM Enhanced BiRNN-CRF for Joint Chinese Word Segmentation and POS Tagging., , , , and . NLPCC (2), volume 11109 of Lecture Notes in Computer Science, page 105-116. Springer, (2018)3D Convolutional Neural Networks Based Speaker Identification and Authentication., , , and . ICIP, page 2042-2046. IEEE, (2018)Steganalysis of Adaptive JPEG Steganography Based on ResDet., , , , and . APSIPA, page 549-553. IEEE, (2018)