default search action
Peng Wu 0013
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai, China
Other persons with the same name
- Peng Wu — disambiguation page
- Peng Wu 0001 — Meta, USA (and 2 more)
- Peng Wu 0002 — Chinese Academy of Sciences, Institute of Software, Beijing, China
- Peng Wu 0003 — University of Delaware
- Peng Wu 0004 — Fuzhou University, School of Economics and Management, China (and 2 more)
- Peng Wu 0005 — University of California, Santa Barbara, USA
- Peng Wu 0006 — Facebook (and 1 more)
- Peng Wu 0007 — Tsinghua University, Department of Computer Science, TNList, Beijing, China
- Peng Wu 0008 — Vrije Universiteit Brussel, Department of Electronics and Informatics, Belgium (and 1 more)
- Peng Wu 0009 — University of Connecticut, Department of Computer Science and Engineering, Storrs, CT, USA
- Peng Wu 0010 — Anhui University, School of Mathematical Science, Hefei, China
- Peng Wu 0011 — Curtin University, Department of Construction Management, Perth, Australia
- Peng Wu 0012 — Beijing Technology and Business University (BTBU), Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Conghui Zheng, Li Pan, Peng Wu:
JORA: Weakly Supervised User Identity Linkage via Jointly Learning to Represent and Align. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3900-3911 (2024) - [c12]Mohan Gao, Peng Wu, Li Pan:
MINES: Multi-perspective API Call Sequence Behavior Fusion Malware Classification. DASFAA (4) 2024: 210-220 - [i1]Yi Ouyang, Peng Wu, Li Pan:
COOL: Comprehensive Knowledge Enhanced Prompt Learning for Domain Adaptive Few-shot Fake News Detection. CoRR abs/2406.10870 (2024) - 2023
- [j9]Peng Wu, Conghui Zheng, Li Pan:
A Unified Generative Adversarial Learning Framework for Improvement of Skip-Gram Network Representation Learning Methods. IEEE Trans. Knowl. Data Eng. 35(1): 45-58 (2023) - [j8]Conghui Zheng, Li Pan, Peng Wu:
Attribute Augmented Network Embedding Based on Generative Adversarial Nets. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3473-3487 (2023) - 2022
- [j7]Conghui Zheng, Li Pan, Peng Wu:
CAMU: Cycle-Consistent Adversarial Mapping Model for User Alignment Across Social Networks. IEEE Trans. Cybern. 52(10): 10709-10720 (2022) - [c11]Jingzhe Liu, Peng Wu:
Penalty Prediction Based on Modulated Hierarchical Attention Coupled with Legal Attribute Recognition. IEEE Big Data 2022: 1880-1885 - [c10]Yi Ouyang, Peng Wu, Li Pan:
Asymmetrical Context-aware Modulation for Collaborative Filtering Recommendation. CIKM 2022: 1595-1604 - [c9]Mohan Gao, Peng Wu, Li Pan:
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences. ICICS 2022: 492-507 - [c8]Zhikai Chen, Peng Wu, Li Pan:
Leveraging Diversity-Aware Context Attention Networks for Fake News Detection on Social Platforms. IJCNN 2022: 1-8 - 2021
- [j6]Peng Wu, Li Pan, Conghui Zheng:
Mining Set of Interested Communities with Limited Exemplar Nodes for Network Based Services. IEEE Trans. Serv. Comput. 14(4): 1138-1151 (2021) - [c7]Changhao Bai, Peng Wu:
PRRL: Path Rotation based Knowledge Graph Representation Learning method. BDCAT 2021: 38-45 - [c6]Yuanhang Xu, Peng Wu:
Multiscale Clustering Based Diffusion Representation Learning Method. BDCAT 2021: 46-51 - [c5]Wenhan Gao, Peng Wu, Li Pan:
Attribute Network Embedding Method based on Joint Clustering of Representation and Network. BDCAT 2021: 111-119 - 2020
- [j5]Conghui Zheng, Li Pan, Peng Wu:
Multimodal Deep Network Embedding With Integrated Structure and Attribute Information. IEEE Trans. Neural Networks Learn. Syst. 31(5): 1437-1449 (2020) - [c4]Yiting Qian, Li Pan, Peng Wu, Zhengmin Xia:
GeST: A Grid Embedding based Spatio-Temporal Correlation Model for Crime Prediction. DSC 2020: 1-7
2010 – 2019
- 2019
- [c3]Yaoxuan Ji, Li Pan, Peng Wu:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. DSC 2019: 176-182 - 2018
- [j4]Huijuan Li, Li Pan, Peng Wu:
Dominated competitive influence maximization with time-critical and time-delayed diffusion in social networks. J. Comput. Sci. 28: 318-327 (2018) - [j3]Peng Wu, Li Pan:
Mining application-aware community organization with expanded feature subspaces from concerned attributes in social networks. Knowl. Based Syst. 139: 1-12 (2018) - 2017
- [j2]Peng Wu, Li Pan:
Scalable influence blocking maximization in social networks under competitive independent cascade models. Comput. Networks 123: 38-50 (2017) - [c2]Qinchen Wu, Peng Wu, Li Pan:
Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic Networks. CollaborateCom 2017: 660-669 - 2016
- [j1]Peng Wu, Li Pan:
Multi-objective community detection method by integrating users' behavior attributes. Neurocomputing 210: 13-25 (2016) - 2014
- [c1]Peng Wu, Li Pan:
Detecting highly overlapping community structure based on Maximal Clique Networks. ASONAM 2014: 196-199
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint