Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation and analysis of bundle protocol in cislunar communications., , and . ICCC, page 551-555. IEEE, (2012)Floor-cleaning robot using omni-directional wheels., , , and . Ind. Robot, 36 (2): 157-164 (2009)Towards Accurate Subgraph Similarity Computation via Neural Graph Pruning., , , and . CoRR, (2022)REACH2-Mote: A Range-Extending Passive Wake-Up Wireless Sensor Node., , , , , , , , and . ACM Trans. Sens. Networks, 11 (4): 64:1-64:33 (2015)An Algorithm for Locating Subcritical Underground Goaf Based on InSAR Technique and Improved Probability Integral Model., , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)A Local Algorithm for Structure-Preserving Graph Cut., , , , , , and . KDD, page 655-664. ACM, (2017)High-Order Structure Exploration on Massive Graphs: A Local Graph Clustering Perspective., , , , , , and . ACM Trans. Knowl. Discov. Data, 15 (2): 18:1-18:26 (2021)Goaf Locating Based on InSAR and Probability Integration Method., , , , and . Remote. Sens., 11 (7): 812 (2019)Fault Template Attack Based on Fault Probability., , , and . IEEE Access, (2023)Hiding Visual Information via Obfuscating Adversarial Perturbations., , , , , and . ICCV, page 4333-4343. IEEE, (2023)