Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Supervised Depth Completion Guided by 3D Perception and Geometry Consistency., , , and . CoRR, (2023)Deep reinforcement learning based efficient access scheduling algorithm with an adaptive number of devices for federated learning IoT systems., , , and . Internet Things, (December 2023)Explainable prediction of deposited film thickness in IC fabrication with CatBoost and SHapley Additive exPlanations (SHAP) models., , , and . Appl. Intell., 54 (1): 246-263 (January 2024)A novel controllable carrier-injection mechanism in high voltage diode for reducing switching loss., , , , , and . IEICE Electron. Express, 11 (17): 20140461 (2014)Co-regularized Multi-view Subspace Clustering., , , and . ACML, volume 95 of Proceedings of Machine Learning Research, page 17-32. PMLR, (2018)Supporting data quality management in decision-making., and . Decis. Support Syst., 42 (1): 302-317 (2006)Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation, and Recovery., , , and . DSN, page 438-449. IEEE Computer Society, (2015)Scripting for Administration, Automation and Security., and . SIGITE, page 147. ACM, (2018)Cybersecurity Should be Taught Top-Down and Case-Driven., and . SIGITE, page 103-108. ACM, (2017)Blind Image Deblurring via Salient Structure Detection and Sparse Representation., , and . PSIVT Workshops, volume 10799 of Lecture Notes in Computer Science, page 283-299. Springer, (2017)