Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A power allocation algorithm to maximize capacity in a full-duplex multi-carrier system., , , , and . WOCC, page 128-132. IEEE, (2015)A new investment strategy based on data mining and Neural Networks., and . IJCNN, page 3094-3099. IEEE, (2014)Curriculum Adversarial Training., , and . IJCAI, page 3740-3747. ijcai.org, (2018)Interacting multiple model-based human motion prediction for motion planning of companion robots., , and . SSRR, page 1-7. IEEE, (2015)Efficient Data Collection with Spatial Clustering in Time Constraint WSN Applications., , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 728-742. Springer, (2012)Web survey design with active server pages: a new research method., , , and . IRMA Conference, page 1188-1189. IDEA Group Publishing, (2000)Delving into Transferable Adversarial Examples and Black-box Attacks., , , and . CoRR, (2016)Distributed target localization using a group of UGVs under dynamically changing interaction topologies., , and . ACC, page 2585-2590. IEEE, (2016)Fast Uyghur text detection in videos based on learning of baseline feature., , , and . VCIP, page 1-4. IEEE, (2015)Deep Learning Based Supervised Semantic Segmentation of Electron Cryo-Subtomograms., , , , , , and . ICIP, page 1578-1582. IEEE, (2018)