From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network., , , и . J. Sensors, (2015)Improved Successive Cancellation Decoding of Polar Codes., , и . IEEE Trans. Commun., 61 (8): 3100-3107 (2013)Dynamic queuing sharing mechanism for per-flow quality of service control., , , и . IET Commun., 4 (4): 472-483 (2010)Practical polar code construction over parallel channels., , и . IET Commun., 7 (7): 620-627 (2013)HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks., , , , , , и . CoRR, (2021)SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems., , , , , , и . CoRR, (2021)HAFLO: GPU-Based Acceleration for Federated Logistic Regression., , , , и . CoRR, (2021)Exploring the Generalizability of Spatio-Temporal Traffic Prediction: Meta-Modeling and an Analytic Framework., , , , и . IEEE Trans. Knowl. Data Eng., 35 (4): 3870-3884 (апреля 2023)Safer-Instruct: Aligning Language Models with Automated Preference Data., , и . CoRR, (2023)A Survey for Federated Learning Evaluations: Goals and Measures., , , , , и . CoRR, (2023)