Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ancient poetry generation with an unsupervised method., , , , , and . Neural Comput. Appl., 34 (11): 8525-8538 (2022)Analytic Expression of Quantum Discords in Werner States under LQCC., , , and . Entropy, 22 (2): 147 (2020)Enhancing Chinese Character Representation With Lattice-Aligned Attention., , , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (7): 3727-3736 (July 2023)Quantum Correlation Swapping between Two Werner States Undergoing Local and Nonlocal Unitary Operations., , , and . Entropy, 24 (9): 1244 (2022)LELNER: A Lightweight and Effective Low-resource Named Entity Recognition model., , , and . Knowl. Based Syst., (2022)Tripartite quantum operation sharing with two asymmetric three-qubit W states in five entanglement structures., , , , and . Quantum Inf. Process., 13 (8): 1659-1676 (2014)Analytic expressions of discord and geometric discord in Werner derivatives., , , , and . Quantum Inf. Process., 13 (6): 1331-1344 (2014)Deficiency in anterior-posterior connectivity of default-mode network in amnestic mild cognitive impairment: A combined task-related and resting-state fMRI study., , , , , , , and . BMEI, page 228-232. IEEE, (2011)Research on security testing of information system based on interface communication., , , and . EMEIT, page 3915-3918. IEEE, (2011)