Author of the publication

A framework for deep neural network multiuser authorization based on channel pruning.

, , , , and . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting duration of traffic accidents based on cost-sensitive Bayesian network and weighted K-nearest neighbor., , , , and . J. Intell. Transp. Syst., 23 (2): 161-174 (2019)A Novel Probabilistic Model for Link Unification Grammar., , , and . IWPT, Tsinghua University Press, (2001)SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph., , , , and . CSCWD, page 1098-1105. IEEE, (2023)CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6., , , , , and . ISCC, page 1327-1330. IEEE, (2023)WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process., , , , , and . MASS, page 19-27. IEEE Computer Society, (2018)DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution., , , , , , and . CollaborateCom (3), volume 563 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 347-364. Springer, (2023)IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic., , , , and . ISCC, page 1-7. IEEE, (2019)A Review of Three-Dimensional Facial Asymmetry Analysis Methods., , and . Symmetry, 14 (7): 1414 (2022)Semantics and locality preserving correlation projections., , , and . ICME, page 913-918. IEEE Computer Society, (2017)Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model., and . MSN, page 195-200. IEEE Computer Society, (2014)