Author of the publication

An Empirical Study of Common Challenges in Developing Deep Learning Applications.

, , , , and . ISSRE, page 104-115. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of thermal conductivity and viscosity of graphite suspensions, , , , and . (2014)A comparative study of assessment methods for medical image quality., , , , , and . BMEI, page 131-134. IEEE, (2012)Research on Adaptive Wrapper in Deep Web Data Extraction., , and . IOV, volume 9502 of Lecture Notes in Computer Science, page 409-423. Springer, (2015)Backstepping trajectory tracking control of electro-hydraulic actuators of lower limb load exoskeleton., , , , and . IECON, page 6073-6078. IEEE, (2016)Cooperative Work Mechanism in UUHDB System Based on MAS., , and . CSCWD, page 358-361. IEEE, (2001)The United Use of Multiple Information Sources Based on CSCW., and . CSCWD, page 432-436. IEEE, (2002)Model Predictive Control for Tumor Motion Compensation in Robot Assisted Radiotherapy, , and . Proceedings of the 18th IFAC World Congress 2011, page 5968--5973. Milano, Italy, (September 2011)Dynamic Event-Triggered State Estimation for Discrete-Time Singularly Perturbed Systems With Distributed Time-Delays., , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (9): 3258-3268 (2020)Generalized message passing detection of SCMA systems based on dynamic factor graph for better and flexible performance-complexity tradeoff., , , and . Sci. China Inf. Sci., 65 (5): 1-8 (2022)Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules., , , , , , , , and . CoRR, (2019)