Author of the publication

Learning to Transfer Under Unknown Noisy Environments: An Universal Weakly-Supervised Domain Adaptation Method.

, , , , , and . ICME, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing the Capability of Vehicular Fog Computing in Large-scale Urban Environment., , , and . Mob. Networks Appl., 23 (4): 1050-1067 (2018)PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks., , , and . Secur. Commun. Networks, (2019)Real-Time and Accurate Gesture Recognition With Commercial RFID Devices., , , , , , , and . IEEE Trans. Mob. Comput., 22 (12): 7327-7342 (December 2023)Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems., , , , and . IEEE Trans. Mob. Comput., 20 (9): 2891-2905 (2021)Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method., , , , and . IEEE Trans. Mob. Comput., 21 (4): 1476-1491 (2022)Who stole my cheese?: Verifying intactness of anonymous RFID systems., , , , , , and . Ad Hoc Networks, (2016)Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things., , , and . IEEE Access, (2017)Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks., , , , , and . Comput. Commun., 36 (10-11): 1235-1244 (2013)One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems., , , and . ICC, page 1-6. IEEE, (2016)LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences., , , and . IEEE Trans. Reliability, 69 (1): 174-187 (2020)