Author of the publication

Theoretical Models and Preliminary Results for Contact Tracing and Isolation.

, , , , , , and . AAMAS, page 1672-1674. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Time-Domain Seismic Imaging Method With Sparse Pulsed-Beams Data., , and . IEEE Trans. Geosci. Remote. Sens., (2022)Transferable Black-Box Attack Against Face Recognition With Spatial Mutable Adversarial Patch., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)A Markov Game model for valuing actions, locations, and team performance in ice hockey., , , , , and . Data Min. Knowl. Discov., 31 (6): 1735-1757 (2017)An optimized DFT technology based on machine learning., , and . ITC-Asia, page 1-4. IEEE, (2021)End-to-End Keyword Search Based on Attention and Energy Scorer for Low Resource Languages., and . INTERSPEECH, page 2587-2591. ISCA, (2020)Dual-Mode Serial Night Road Object Detection Model Based on Depthwise Separable and Self-Attention Mechanism., , , and . IEEE Trans. Instrum. Meas., (2024)Throughput analysis based on antenna downtilt design in coordinated multi-cell 3D MIMO system., , , , and . ISCIT, page 1-6. IEEE, (2017)GesGPT: Speech Gesture Synthesis With Text Parsing From ChatGPT., , , , , and . IEEE Robotics Autom. Lett., 9 (3): 2718-2725 (2024)AGFNet: Attention Guided Fusion Network for Camouflaged Object Detection., , and . CICAI (1), volume 13604 of Lecture Notes in Computer Science, page 478-489. Springer, (2022)Research on video adversarial attack with long living cycle., , , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 2374-2382. PMLR, (2022)