Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of AI-Based TCM Prescription Analysis Applet., , , , , , , and . ACCC, page 13-18. IEEE, (2022)The LAMOST Survey of Background Quasars in the Vicinity of the Andromeda and Triangulum Galaxies -- II. Results from the Commissioning Observations and the Pilot Surveys, , , , , , , , , and 61 other author(s). (2013)cite arxiv:1304.3174Comment: 26 pages, 6 figures, AJ accepted.The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model., and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 283-293. Springer, (2011)Inverse-time protection scheme for active distribution network based on user-defined characteristics., , , , and . ISGT Europe, page 1-6. IEEE, (2017)An LPI design for secure burst communication systems., , , and . ChinaSIP, page 631-635. IEEE, (2014)Large-scale multimodal mining for healthcare with mapreduce., , , , , , and . IHI, page 479-483. ACM, (2010)Regularized clustering for documents., , and . SIGIR, page 95-102. ACM, (2007)A novel radar radiation control strategy based on passive tracking in multiple aircraft platforms., , , and . ChinaSIP, page 777-780. IEEE, (2014)FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery., , , , , and . KDD, page 1186-1195. ACM, (2014)Cascading outbreak prediction in networks: a data-driven approach., , , , , and . KDD, page 901-909. ACM, (2013)