Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Abused Webpage Detection Method Based on Screenshots Text Recognition., , , , and . ICEA, page 106-110. ACM, (2021)kNN-CAM: A k-Nearest Neighbors-based Configurable Approximate Floating Point Multiplier., , , , , and . ISQED, page 1-7. IEEE, (2019)StructBERT: Incorporating Language Structures into Pre-training for Deep Language Understanding., , , , , , , and . ICLR, OpenReview.net, (2020)Mining Cross-network Association for YouTube Video Promotion., , and . ACM Multimedia, page 557-566. ACM, (2014)Practical and Effective Domain-Specific Function Unit Design for CGRA., , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 577-592. Springer, (2011)Composite Optimization for Electromigration Reliability and Noise in Power Grid Networks., , , and . ISCAS, page 1-5. IEEE, (2019)Robust mixed one-bit compressive sensing., , , , , , and . Signal Process., (2019)HANSEL: Adaptive horizontal scaling of microservices using Bi-LSTM., , , , and . Appl. Soft Comput., (2021)Hessian Informed Mirror Descent., and . J. Sci. Comput., 92 (3): 90 (2022)Optimizing Convolutional Neural Network Performance by Mitigating Underfitting and Overfitting., , and . ICIS, page 126-131. IEEE, (2021)