Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal robust Bayes estimation, and . Journal of Statistical Planning and Inference, 46 (3): 365--380 (Aug 15, 1995)OM-TCN: A dynamic and agile opponent modeling approach for competitive games., , , , and . Inf. Sci., (2022)The information hiding mechanism based on compressed document format., , , , and . IJCSM, 6 (1): 97-106 (2015)Optimizing the restoration performance of deduplication systems through an energy-saving data layout., , , , , and . Ann. des Télécommunications, 74 (7-8): 461-471 (2019)An Efficient Bounded Model Checking Approach for Web Service Composition., , , , , and . Mob. Networks Appl., 26 (4): 1503-1513 (2021)Code Decoupling Execution Isolating Based on TF Card Firmware Extension., , , , , , and . DSC, page 403-408. IEEE, (2021)Free Adversarial Training with Layerwise Heuristic Learning., , , , , and . ICIG (2), volume 12889 of Lecture Notes in Computer Science, page 120-131. Springer, (2021)A Method of Deduplication for Data Remote Backup., , , , and . CCTA (1), volume 344 of IFIP Advances in Information and Communication Technology, page 68-75. Springer, (2010)Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators., , , , , and . J. Parallel Distributed Comput., (2024)Research on Evasion and Detection of Malicious JavaScript Code., , , and . ML4CS, volume 14541 of Lecture Notes in Computer Science, page 104-130. Springer, (2023)