50 results on '"Hongyun Cai"'
Search Results
2. FedRecTID: A General Robust Federated Recommendation Framework Based on Target Items Detection.
3. PLFa-FL: Personalized Local Differential Privacy for Fair Federated Learning.
4. Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory.
5. STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things.
6. A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems.
7. Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks.
8. Friend Ranking in Online Games via Pre-training Edge Transformers.
9. A Cooperative PoW and Incentive Mechanism for Blockchain in Edge Computing.
10. A Robust Sequential Recommendation Model Based on Multiple Feedback Behavior Denoising and Trusted Neighbors.
11. FLMAAcBD: Defending against backdoors in Federated Learning via Model Anomalous Activation Behavior Detection.
12. Bi-TWD: A Unified Attack Detection Framework in Recommender Systems Based on BiLSTM and Three-way Decision.
13. Friendship links-based privacy-preserving algorithm against inference attacks.
14. Friend Recall in Online Games via Pre-training Edge Transformers.
15. Initialization for Network Embedding: A Graph Partition Approach.
16. An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features.
17. BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender Systems.
18. An Attention-Based Model for Learning Dynamic Interaction Networks.
19. Modeling Marked Temporal Point Process Using Multi-relation Structure RNN.
20. An Algorithm Based on Influence to Predict Invisible Relationship.
21. Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings.
22. LightPoW: A trust based time-constrained PoW for blockchain in internet of things.
23. An Algorithm Based on Influence to Predict Invisible Relationship.
24. Embedding Both Finite and Infinite Communities on Graphs [Application Notes].
25. Double Regularization Matrix Factorization Recommendation Algorithm.
26. An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items.
27. Detecting shilling attacks in recommender systems based on analysis of user rating behavior.
28. Learning Community Embedding with Community Detection and Node Embedding on Graphs.
29. Learning high-order structural and attribute information by knowledge graph attention networks for enhancing knowledge graph embedding.
30. A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications.
31. From Community Detection to Community Profiling.
32. Learning High-order Structural and Attribute information by Knowledge Graph Attention Networks for Enhancing Knowledge Graph Embedding.
33. Effective and Efficient Network Embedding Initialization via Graph Partitioning.
34. What are Popular: Exploring Twitter Features for Event Detection, Tracking and Visualization.
35. Multi-Output Regression with Tag Correlation Analysis for Effective Image Tagging.
36. Social event identification and ranking on flickr.
37. Indexing Evolving Events from Tweet Streams.
38. Imagilar: A Real-Time Image Similarity Search System on Mobile Platform.
39. Spatio-temporal Event Modeling and Ranking.
40. Context Sensitive Tag Expansion with Information Inference.
41. SocialLens: Searching and Browsing Communities by Content and Interaction.
42. A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment.
43. Study on the Recommendation Trust Model Based on Encouragement and Punishment.
44. From Community Detection to Community Profiling.
45. Active Learning for Graph Embedding.
46. A Comprehensive Survey of Graph Embedding: Problems, Techniques and Applications.
47. Indexing evolving events from tweet streams.
48. Near-duplicate video retrieval: Current research and future trends.
49. From Node Embedding To Community Embedding.
50. EventEye: Monitoring Evolving Events from Tweet Streams.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.