323 results on '"Neng Gao"'
Search Results
52. FGRec: A Fine-Grained Point-of-Interest Recommendation Framework by Capturing Intrinsic Influences.
53. User Alignment with Jumping Seed Alignment Information Propagation.
54. Binarized Attributed Network Embedding via Neural Networks.
55. SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario.
56. Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling.
57. DCAR: Deep Collaborative Autoencoder for Recommendation with Implicit Feedback.
58. Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream.
59. Knowledge Graph Embedding with Order Information of Triplets.
60. Attributed Network Embedding via a Siamese Neural Network.
61. Your Pedometer Tells You: Attribute Inference via Daily Walking Step Count.
62. Differential Attribute Desensitization System for Personal Information Protection.
63. The Application of Network Based Embedding in Local Topic Detection from Social Media.
64. Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media.
65. STNet: A Style Transformation Network for Deep Image Steganography.
66. SCS: Style and Content Supervision Network for Character Recognition with Unseen Font Style.
67. HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation.
68. Node-Edge Bilateral Attributed Network Embedding.
69. Aligning Users Across Social Networks by Joint User and Label Consistence Representation.
70. Demographic Prediction from Purchase Data Based on Knowledge-Aware Embedding.
71. Anchor User Oriented Accordant Embedding for User Identity Linkage.
72. AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
73. Dynamic Graph Link Prediction by Semantic Evolution.
74. Reducing Style Overfitting for Character Recognition via Parallel Neural Networks with Style to Content Connection.
75. TransI: Translating Infinite Dimensional Embeddings Based on Trend Smooth Distance.
76. More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
77. Personalized Point-of-Interest Recommendation on Ranking with Poisson Factorization.
78. TransGate: Knowledge Graph Embedding with Shared Gate Structure.
79. MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
80. Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
81. User Identity Linkage with Accumulated Information from Neighbouring Anchor Links.
82. NANE: Attributed Network Embedding with Local and Global Information.
83. Translation-Based Attributed Network Embedding.
84. MultNet: An Efficient Network Representation Learning for Large-Scale Social Relation Extraction.
85. SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks.
86. Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging.
87. CNN-Based Chinese Character Recognition with Skeleton Feature.
88. A MIML-LSTM neural network for integrated fine-grained event forecasting.
89. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
90. Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
91. HidingGAN: High Capacity Information Hiding with Generative Adversarial Network.
92. CARec: Content-Aware Point-of-Interest Recommendation via Adaptive Bayesian Personalized Ranking.
93. A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
94. System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
95. Novel marine ejector-compression waste heat-driven refrigeration system: technical possibilities and environmental advantages
96. Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
97. Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
98. Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study.
99. Linking Thermal Conductivity and Self-Diffusion Coefficient with a Simple Dimensionless Calorimetric Parameter for Saturated Liquids
100. Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.