Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Untrustworthy Samples: Data Filtering for Open-domain Dialogues with Bayesian Optimization., , , , , and . CIKM, page 1598-1608. ACM, (2021)TargetDrop: A Targeted Regularization Method for Convolutional Neural Networks., and . ICASSP, page 3283-3287. IEEE, (2022)Enhancing Semi-Supervised Learning with Cross-Modal Knowledge., , , , , , , , , and . ACM Multimedia, page 4456-4465. ACM, (2022)Design of Photovoltaic Power Intelligent Patrol Robot., , and . MICAD, volume 633 of Lecture Notes in Electrical Engineering, page 207-219. Springer, (2020)Designing Dielectric-Metalens with Selection of Structural Units Encircling an Exceptional Point., , , , and . ICAIT, page 369-373. IEEE, (2023)An Attention-Guided Two-Stream Convolutional Neural Network for Few-Shot Learning., and . ICME, page 1-6. IEEE, (2022)QTL: An efficient scheduling policy for 10Gbps network intrusion detection system., , , , and . ISCC, page 190-195. IEEE Computer Society, (2010)Robust TCP Reassembly with a Hardware-Based Solution for Backbone Traffic., , , , and . NAS, page 439-447. IEEE Computer Society, (2010)UCWE: A User-Centric Approach for Web Quality of Experience Measurement., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 928-935. IEEE, (2019)Heterogeneous information network embedding for user behavior analysis on social media., , , and . Neural Comput. Appl., 34 (7): 5683-5699 (2022)