Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scale Up Event Extraction Learning via Automatic Training Data Generation., , , , , , and . CoRR, (2017)Extended Coprime Array Configuration Generating Large-Scale Antenna Co-Array in Massive MIMO System., , , , and . IEEE Trans. Vehicular Technology, 68 (8): 7841-7853 (2019)Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State., , , , , and . Entropy, 17 (10): 6743-6752 (2015)Deep Learning-Based Intrusion Detection With Adversaries.. IEEE Access, (2018)Genetic algorithm based energy-saving ATO control algorithm for CBTC., , , and . Comput. Syst. Sci. Eng., (2017)A readout method based on 10 Gigabit Ethernet for Sipixel detector., , , , , , , , and . CoRR, (2018)An energy harvesting mechanism transfer human walking energy to hydraulic power., , , and . M2VIP, page 1-5. IEEE, (2017)Solar Power Forecasting.. University of Sydney, Australia, (2019)base-search.net (ftunivsydney:oai:ses.library.usyd.edu.au:2123/21248).Competition Analysis of Adaptive Incentive Protocols for P2P Networks., , and . ICC, page 1-6. IEEE, (2011)Independent Metropolis-Hastings-Klein algorithm for lattice Gaussian sampling., and . ISIT, page 2470-2474. IEEE, (2015)