Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Model Based on Rough Set and Random Forest., , , and . Int. J. Grid High Perform. Comput., 14 (1): 1-13 (2022)Understanding user activity patterns of the Swarm app: a data-driven study., , , , and . UbiComp/ISWC Adjunct, page 125-128. ACM, (2017)Exploiting the Collision-Free Region with Slotting Access for Data-Gathering in the Linear UANs., , , , and . ICCC, page 1-6. IEEE, (2023)On Pitfalls of Test-Time Adaptation., , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 42058-42080. PMLR, (2023)Production planning optimization of an ethylene plant considering process operation and energy utilization., , and . Comput. Chem. Eng., (2016)Integrated model of refining and petrochemical plant for enterprise-wide optimization., , , and . Comput. Chem. Eng., (2017)A Human Arm's Mechanical Impedance Tuning Method for Improving the Stability of Haptic Rendering., , , and . Robotica, 39 (4): 652-664 (2021)A Cross-Platform Consumer Behavior Analysis of Large-Scale Mobile Shopping Data., , , , , , , , and . WWW, page 1785-1794. ACM, (2018)Decoder Network over Lightweight Reconstructed Feature for Fast Semantic Style Transfer., , , , , and . ICCV, page 2488-2496. IEEE Computer Society, (2017)MARS: An Instance-Aware, Modular and Realistic Simulator for Autonomous Driving., , , , , , , , , and 6 other author(s). CICAI (1), volume 14473 of Lecture Notes in Computer Science, page 3-15. Springer, (2023)