Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The research of experiment design based on simulation information reliability and Bayesian posteriori risk., and . ICNC, page 1835-1839. IEEE, (2013)Infrared Image Enhancement Algorithm Based on Multiscale Guided Filtering., , , and . ICVIP, page 31-36. ACM, (2023)Privacy-preserving Federated Adversarial Domain Adaption over Feature Groups for Interpretability., , , , and . CoRR, (2021)A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles., , , , and . Int. J. Netw. Secur., 22 (2): 275-282 (2020)Segmentation of Small Animal Computed Tomography Images Using Original CT Values and Converted Grayscale Values., , and . CCTA (1), volume 419 of IFIP Advances in Information and Communication Technology, page 470-477. Springer, (2013)FATE-LLM: A Industrial Grade Federated Learning Framework for Large Language Models., , , , , , and . CoRR, (2023)The change of urban population spatial structure of Nanjing, 1982-2007: Based on ESDA, density function and GIS., and . Geoinformatics, page 1-4. IEEE, (2010)Research on SLAM Intelligent Robot Based on Visual Laser Fusion., , , , and . CRC, page 53-57. IEEE, (2023)Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk., , , , , and . Int. J. Netw. Secur., 22 (2): 347-357 (2020)SecureBoost+: Large Scale and High-Performance Vertical Federated Gradient Boosting Decision Tree., , , , , and . PAKDD (3), volume 14647 of Lecture Notes in Computer Science, page 237-249. Springer, (2024)