Browsing byAuthorFu, C

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 9 of 9
Issue DateTitleAuthor(s)
2021A cross-domain recommender system through information transfer for medical diagnosisChang, W; Zhang, Q; Fu, C; Liu, W; Zhang, G; Lu, J
2017-09-01Evolutionary virus immune strategy for temporal networks based on community vitalityLi, M; Fu, C; Liu, XY; Yang, J; Zhu, T; Han, L
2023-09-01Model Checking for Probabilistic Multiagent SystemsFu, C; Turrini, A; Huang, X; Song, L; Feng, Y; Zhang, LJ
2018-01-01Model checking probabilistic epistemic logic for probabilistic multiagent systemsFu, C; Turrini, A; Huang, X; Song, L; Feng, Y; Zhang, L
2020-06Salience-Guided Cascaded Suppression Network for Person Re-IdentificationChen, X; Fu, C; Zhao, Y; Zheng, F; Song, J; Ji, R; Yang, Y
2019-12-10Targeting malware discrimination based on reversed association taskHan, L; Zhou, M; Han, S; Jia, W; Sun, C; Fu, C
2012-01-01Task-based behavior detection of illegal codesHan, L; Fu, C; Zou, D; Lee, CH; Jia, W
2021-02-16The 2021 battery technology roadmapMa, J; Li, Y; Grundish, NS; Goodenough, JB; Chen, Y; Guo, L; Peng, Z; Qi, X; Yang, F; Qie, L; Wang, C-A; Huang, B; Huang, Z; Chen, L; Su, D; Wang, G; Peng, X; Chen, Z; Yang, J; He, S; Zhang, X; Yu, H; Fu, C; Jiang, M; Deng, W; Sun, C-F; Pan, Q; Tang, Y; Li, X; Ji, X; Wan, F; Niu, Z; Lian, F; Wang, C; Wallace, GG; Fan, M; Meng, Q; Xin, S; Guo, Y-G; Wan, L-J
2019-07-01Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social NetworksFu, C; Liu, XY; Yang, J; Yang, LT; Yu, S; Zhu, T