Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System?, , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 51-64. Springer, (2020)Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images., , , , , and . Remote. Sens., 15 (4): 885 (February 2023)Review of the Electric Vehicle Charging Station Location Problem., , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 435-445. Springer, (2019)Introduction to the MDATA Model., , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)Knowledge Graph Embedding via Adaptive Negative Subsampling., , , , , and . DSC, page 38-43. IEEE, (2023)A Multi-step Attack Detection Framework for the Power System Network., , , , , and . DSC, page 1-8. IEEE, (2022)Exploring Efficient Strategies for Minesweeper., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks., , , , and . MSWiM, page 313-320. ACM, (2014)Convolutional Neural Network based Timbre Classification., , , , , and . CIAT, page 186-191. ACM, (2020)Approximation Algorithms for Controller Placement Problems in Software Defined Networks., , , , and . DSC, page 250-257. IEEE, (2018)