Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Swarm-Based Spreading Points., , , and . ICSI (2), volume 10386 of Lecture Notes in Computer Science, page 158-166. Springer, (2017)Software Defect Prediction Based on Ensemble Learning., , , , , and . DSIT, page 1-6. ACM, (2019)Texture-Enhanced Framework by Differential Filter-Based Re-parameterization for Super-Resolution on PC/Mobile., , , and . Neural Process. Lett., 55 (9): 12183-12203 (December 2023)Attributed Multi-relational Graph Embedding Based on GCN., , , , , and . ICIC (2), volume 14087 of Lecture Notes in Computer Science, page 174-186. Springer, (2023)Key technology research on the implementation of computer network security defense system.. IPEC, page 658-661. ACM, (2022)The design and application of data warehouse during modern enterprises environment., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 624110. SPIE, (2006)Research on parallel algorithm for sequential pattern mining., , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730Q. SPIE, (2008)Optimal Potentials of Measure Differential Equations with Given Spectral Data., , and . J. Optimization Theory and Applications, 184 (1): 139-161 (2020)P2P Traffic Identification by TCP Flow Analysis., , and . IWNAS, page 47-50. IEEE Computer Society, (2006)Static graph convolution with learned temporal and channel-wise graph topology generation for skeleton-based action recognition., , , , and . Comput. Vis. Image Underst., (2024)