Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Left and right hand distinction for multi-touch tabletop interactions., , , , , and . IUI, page 47-56. ACM, (2014)GMM-based Undersampling and Its Application for Credit Card Fraud Detection., , , , and . IJCNN, page 1-8. IEEE, (2019)The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining., , , , , , and . COMPSAC, page 694-703. IEEE, (2021)3D model-based continuous emotion recognition., , , , and . CVPR, page 1836-1845. IEEE Computer Society, (2015)Multimodal Visual Analysis of Vector-Borne Infectious Diseases., , , , , and . IGTA, volume 875 of Communications in Computer and Information Science, page 135-145. Springer, (2018)一种基于2D和3D联合信息的改进MDP跟踪算法 (Improved MDP Tracking Method by Combining 2D and 3D Information)., , , , , and . 计算机科学, 46 (3): 97-102 (2019)Intrusion detection technique based on flow aggregation and latent semantic analysis., , , and . Appl. Soft Comput., (2022)Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings., , , , , and . ICISSP, page 651-658. SciTePress, (2023)Who Are the Money Launderers? Money Laundering Detection on Blockchain via Mutual Learning-Based Graph Neural Network., , , , , and . IJCNN, page 1-8. IEEE, (2023)A Solution to Digital Image Copyright Registration Based on Consortium Blockchain., , , , and . IGTA, volume 875 of Communications in Computer and Information Science, page 228-237. Springer, (2018)