Cited By
View all- Chen WChen HHan TTong WZhong S(2025)Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential PrivacyIEEE Transactions on Mobile Computing10.1109/TMC.2024.346474424:1(276-292)Online publication date: Jan-2025
- Wu JFan WChen JLiu SLiu QHe RLi QTang K(2025)Condensing Pre-Augmented Recommendation Data via Lightweight Policy Gradient EstimationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.348424937:1(162-173)Online publication date: Jan-2025
- Nguyen HHoang TDam HGhose A(2025)Graph-based explainable vulnerability predictionInformation and Software Technology10.1016/j.infsof.2024.107566177:COnline publication date: 1-Jan-2025
- Show More Cited By