From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword., , и . IIH-MSP (2), том 82 из Smart Innovation, Systems and Technologies, стр. 169-176. Springer, (2017)APRS: Automatic pruning ratio search using Siamese network with layer-level rewards., , , , , и . Digit. Signal Process., (марта 2023)Underdetermined Wideband DOA Estimation for Off-Grid Sources with Coprime Array Using Sparse Bayesian Learning., , , и . Sensors, 18 (1): 253 (2018)Robotic Self-Replication in a Structured Environment without Computer Control., , , , , , , и . CIRA, стр. 327-332. IEEE, (2007)Keyword Indexing System with HowNet and PageRank., , , и . ICNSC, стр. 389-393. IEEE, (2008)Research on Text Network Representation., , и . ICNSC, стр. 1217-1221. IEEE, (2008)Interactive Poisson Photometric Propagation for Facial Composite., , , и . J. Multim., 8 (2): 153-160 (2013)Individual retrieval based on oral cavity point cloud data and correntropy-based registration algorithm., , , , , , , , и . IET Image Process., 14 (12): 2675-2681 (2020)Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph., , , и . ICAIS (2), том 11633 из Lecture Notes in Computer Science, стр. 62-74. Springer, (2019)Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model., , , и . ICCCS (3), том 11065 из Lecture Notes in Computer Science, стр. 161-173. Springer, (2018)