Author of the publication

Security situation awareness method of power mobile application based on big data architecture.

, , , and . DSIT, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web service composition based on integrated substitution and adaptation., and . IRI, page 34-39. IEEE Systems, Man, and Cybernetics Society, (2008)Ride-Sharing: A Multi Source-Destination Path Planning Approach., , , , , and . Australasian Conference on Artificial Intelligence, volume 7691 of Lecture Notes in Computer Science, page 815-826. Springer, (2012)Artificial Neural Networks Can Distinguish Genuine and Acted Anger by Synthesizing Pupillary Dilation Signals from Different Participants., , , , and . ICONIP (5), volume 11305 of Lecture Notes in Computer Science, page 299-310. Springer, (2018)A Web Service Similarity Refinement Framework Using Automata Comparison., and . ICISTM, volume 54 of Communications in Computer and Information Science, page 44-55. Springer, (2010)Finding Cloesed Frequent Itemsets in Linear Time., , , and . DMIN, page 291-297. CSREA Press, (2008)Novel Inhibitors Induce Large Conformational Changes of GAB1 Pleckstrin Homology Domain and Kill Breast Cancer Cells., , , , , , , , and . PLoS Comput. Biol., (2015)Saliency based proposal refinement in robotic vision., , and . RCAR, page 85-90. IEEE, (2017)Object detection for noncooperative targets using HOG-based proposals., , and . ROBIO, page 1608-1613. IEEE, (2015)Bionic Architecture Design and Robust Rough-Terrain Locomotion for a High-Payload Quadrupedal Robot., , , , , and . ROBIO, page 1027-1034. IEEE, (2019)Surface Following using Deep Reinforcement Learning and a GelSightTactile Sensor., , and . CoRR, (2019)