Author of the publication

Risk Assessment and Prediction of Underground Utility Tunnels Based on Bayesian Network: A Case Study in Beijing, China.

, , , , and . J. Circuits Syst. Comput., 32 (6): 2350096:1-2350096:23 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations., , , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 400-409. Springer, (2010)A Protocol of Bidirectional Authentication and Authorization for IP Multicast., and . J. Comput. Res. Dev., 43 (11): 1904-1913 (2006)Gradient-Enhanced Electromagnetic Actuation System With a New Core Shape Design for Microrobot Manipulation., , , , and . IEEE Trans. Ind. Electron., 67 (6): 4700-4710 (2020)Deep Level Set with Confidence Map and Boundary Loss for Medical Image Segmentation., , , , , and . ICME, page 1-6. IEEE, (2020)Stabilization Algorithm Based on Improved Motion Model for Jittery Video in Minimally Invasive Surgery., , , , , and . AIM, page 937-941. IEEE, (2019)Leveraging Multimodal Semantic Fusion for Gastric Cancer Screening via Hierarchical Attention Mechanism., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (7): 4286-4299 (2022)Selective attention to lexical tones recruits left dorsal frontoparietal network, , , , , , and . NeuroReport, 14 (17): 2263--2266 (December 2003)Embedded Silicon-Organic Integrated Neuromorphic System., , , , , , and . CoRR, (2022)A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service., , , , and . Frontiers Comput. Sci., 14 (6): 146808 (2020)An Adaptive Contrastive Learning Model for Spike Sorting., , , , and . CoRR, (2022)