Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Escape from escape analysis of Golang., , , , , and . ICSE (SEIP), page 142-151. ACM, (2020)MHILDA: identifying disease-associated lncRNAs by extracting key features from integrated heterogeneous networks., , , , , and . BIBM, page 3320-3327. IEEE, (2022)Black Box Submodular Maximization: Discrete and Continuous Settings., , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 1058-1070. PMLR, (2020)Model based user interface design for predicting lung cancer treatment outcomes., , , , and . EMBC, page 75-78. IEEE, (2011)Self-Paced Video Data Augmentation with Dynamic Images Generated by Generative Adversarial Networks., , , , and . CoRR, (2019)Projection-Free Bandit Convex Optimization., , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 2047-2056. PMLR, (2019)Image Data Augmentation for SAR Sensor via Generative Adversarial Nets., , , and . IEEE Access, (2019)E2N: Error Estimation Networks for Goal-Oriented Mesh Adaptation., , , and . CoRR, (2022)Complex Locomotion Skill Learning via Differentiable Physics., , , , , , , , and . CoRR, (2022)Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free., , , , and . Inf., 15 (1): 32 (2024)