Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From IFC to 3D Tiles: An Integrated Open-Source Solution for Visualising BIMs on Cesium., , , and . ISPRS Int. J. Geo Inf., 7 (10): 393 (2018)DATE: Dual Assignment for End-to-End Fully Convolutional Object Detection., , , and . CoRR, (2022)Convertible identity-based anonymous designated ring signatures., , and . Int. J. Secur. Networks, 1 (3/4): 218-225 (2006)Analyzing and Improving Customer-Side Cloud Security Certifiability., , , and . ISSRE Workshops, page 300-307. IEEE, (2019)Novel Word Features for Keyword Extraction., , , and . WAIM, volume 9098 of Lecture Notes in Computer Science, page 148-160. Springer, (2015)Data Mining Service Based on MDA., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 297-302. Springer, (2004)Representation and Reasoning of Fuzzy Knowledge Under Variable Fuzzy Criterion Using Extended Fuzzy Petri Nets., , , , and . IEEE Trans. Fuzzy Syst., 28 (12): 3376-3390 (2020)DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm., , , and . Security and Management, page 251-257. CSREA Press, (2008)Multi-Agent Hyper-Attention Policy Optimization., , , , , , and . ICONIP (1), volume 13623 of Lecture Notes in Computer Science, page 76-87. Springer, (2022)Global Mapping of the Yeast Genetic Interaction Network, , , , , , , , , and 40 other author(s). Science, 303 (5659): 808--813 (Feb 6, 2004)