Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Efficient Infinity-Shaped Large Angular- and Polarization-Independent Metamaterial Absorber., , , , , and . Symmetry, 15 (2): 352 (February 2023)Text-Based Twitter User Geolocation Prediction., , and . J. Artif. Intell. Res., (2014)Detection and Correction Scheme of Internet Chat Lingo Based on Statistic and Pinyin Similarity., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 169-174. Springer, (2012)A Vulnerability Attack Graph Generation Method Based on Scripts., , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)Data Mining Support for the Improvement of MODIS Aerosol Retrievals., , , and . IGARSS, page 2453-2456. IEEE, (2006)SUM: Suboptimal Unitary Multi-task Learning Framework for Spatiotemporal Data Prediction., , , and . CoRR, (2019)MIMO over ESPAR with 16-QAM Modulation., , , , and . IEEE Wirel. Commun. Lett., 2 (6): 687-690 (2013)Tactical maneuver trajectory optimization for unmanned combat aerial vehicle using improved differential evolution., , , and . Soft Comput., 24 (8): 5959-5970 (2020)Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 437-445. Springer, (2015)一种基于qemu的动态迁移模型 (Analytical Model for Qemu-based Live Migration Strategy)., , and . 计算机科学, 42 (Z6): 337-340 (2015)