Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Normalizing Generative Adversarial Network for Super-Resolution Reconstruction of SAR Images., , , , , and . IGARSS, page 1911-1914. IEEE, (2019)Improving Chinese Internet's Resilience through Degree Rank Based Overlay Relays Placement., , , , and . ICC, page 5823-5827. IEEE, (2008)Automatic classification of wooden cabinet doors., and . WACV, page 18-25. IEEE, (1994)An improved EAAP scheme for vehicular ad hoc networks., , , , , and . Int. J. Commun. Syst., (2020)Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management., , , , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2541-2554 (2020)Curriculum Recommendations Using Transformer Base Model with InfoNCE Loss And Language Switching Method., , , , and . CoRR, (2024)Research on Intelligent Algorithm of Identity Authentication Based on Facial Features., , , and . Wirel. Commun. Mob. Comput., (2021)Clustering Based on Supervised Learning of Exemplar Discriminative Information., , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (12): 5255-5270 (2020)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , and . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , and . ISSTA, page 89-100. ACM, (2023)