From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Scale Balanced Loss for Bounding Box Regression., , , , , , , и . IEEE Access, (2020)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis., , , и . WCNC, стр. 1-6. IEEE, (2017)An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data., , , , и . ICBDC, стр. 151-155. ACM, (2019)On Eliminating Blocking Interference of RFID Unauthorized Reader Detection., , , и . WASA (1), том 13471 из Lecture Notes in Computer Science, стр. 591-602. Springer, (2022)Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition., , , , , , и . ICME, стр. 1-6. IEEE, (2022)CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion., , и . ICT, стр. 1-5. IEEE, (2021)ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis., , , , , и . ICONIP (4), том 14450 из Lecture Notes in Computer Science, стр. 200-212. Springer, (2023)ITAR: A Method for Indoor RFID Trajectory Automatic Recovery., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 400-418. Springer, (2022)Enhanced Correlation Power Analysis by Biasing Power Traces., , , , , и . ISC, том 9866 из Lecture Notes in Computer Science, стр. 59-72. Springer, (2016)