Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of quantum key distribution and private classical communication through continuous variable., , , , and . Quantum Inf. Process., 16 (12): 289 (2017)A transformer-based image detection method for grassland situation of alpine meadows., , , , , and . Comput. Electron. Agric., (July 2023)Enhanced Point Cloud Slicing Method for Volume Calculation of Large Irregular Bodies: Validation in Open-Pit Mining., , , , , , and . Remote. Sens., 15 (20): 5006 (October 2023)A Lightweight Convolutional Neural Network Based on Hierarchical-Wise Convolution Fusion for Remote-Sensing Scene Image Classification., , , and . Remote. Sens., 14 (13): 3184 (2022)A smart cotton module tracking and monitoring system for handling logistics and cover damage., , , , and . Comput. Electron. Agric., (2022)Conspiracy in the time of corona: automatic detection of emerging COVID-19 conspiracy theories in social media and the news., , , , and . J. Comput. Soc. Sci., 3 (2): 279-317 (2020)A CMOS Wideband Watt-Level 4096-QAM Digital Power Amplifier Using Reconfigurable Power-Combining Transformer., , , and . IEEE J. Solid State Circuits, 58 (2): 357-370 (February 2023)Combining channel-wise joint attention and temporal attention in graph convolutional networks for skeleton-based action recognition., , and . Signal Image Video Process., 17 (5): 2481-2488 (July 2023)CS-net: Conv-simpleformer network for agricultural image segmentation., , , , , , and . Pattern Recognit., (March 2024)DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks., , , , , , , and . IEEE Commun. Mag., 56 (11): 21-27 (2018)