Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning-based Face Pose Recovery., , , , and . CoRR, (2019)PSDVec: A toolbox for incremental and scalable word embedding., , and . Neurocomputing, (2017)Randomized Parameterized Algorithms for Co-path Set Problem., , and . FAW, volume 8497 of Lecture Notes in Computer Science, page 82-93. Springer, (2014)F-SWIR: Rumor Fick-spreading model considering fusion information decay in social networks., , , , and . Concurr. Comput. Pract. Exp., (2022)Data Comparison and Software Design for Easy Selection and Application of CRISPR-based Genome Editing Systems in Plants., , , , , , and . Genom. Proteom. Bioinform., 19 (6): 937-948 (2021)Composite Adaptive Anti-Disturbance Fault Tolerant Control of High-Speed Trains With Multiple Disturbances., , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 21799-21809 (2022)Accelerating Fuzzing through Prefix-Guided Execution., and . Proc. ACM Program. Lang., 7 (OOPSLA1): 1-27 (April 2023)Enhanced Attacks on Defensively Distilled Deep Neural Networks., , , and . CoRR, (2017)REFUGE2 Challenge: Treasure for Multi-Domain Learning in Glaucoma Assessment., , , , , , , , , and 18 other author(s). CoRR, (2022)Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving., , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1596-1608 (2017)