Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inductive Method for Evaluating RFID Security Protocols., , , and . Wirel. Commun. Mob. Comput., (2019)Noisy Label Learning With Provable Consistency for a Wider Family of Losses., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (11): 13536-13552 (November 2023)Simple and effective complementary label learning based on mean square error loss., , , , and . Mach. Vis. Appl., 34 (6): 118 (November 2023)Multi-category classification with label noise by robust binary loss., , , , and . Neurocomputing, (2022)Influence of the Bearing Thermal Deformation on Nonlinear Dynamic Characteristics of an Electric Drive Helical Gear System., , and . Sensors, 21 (1): 309 (2021)Multi-object Spatial-Temporal Anomaly Detection Using an LSTM-Based Framework., , , and . Neural Process. Lett., 53 (3): 1811-1821 (2021)Extending Ordinary-Label Learning Losses to Complementary-Label Learning., , , and . IEEE Signal Process. Lett., (2021)Effects of pellet weight in ultrasonic vibration-assisted pelleting for cellulosic biofuel manufacturing., , , and . IJMR, 7 (4): 397-408 (2012)AdvSGAN: Adversarial image Steganography with adversarial networks., , and . Multim. Tools Appl., 80 (17): 25539-25555 (2021)Gradient boosting tree for 1H-MRS Alzheimer diagnosis., , , , and . IJDMB, 23 (1): 12-29 (2020)