Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart object recommendation based on topic learning and joint features in the social internet of things., , , , , , and . Digit. Commun. Networks, 9 (1): 22-32 (February 2023)Aspect-based sentiment classification with multi-attention network., , , and . Neurocomputing, (2020)HOCA: Higher-Order Channel Attention for Single Image Super-Resolution., , , , , and . ICASSP, page 1605-1609. IEEE, (2021)Bishift-Net for Image Inpainting., , , and . ICASSP, page 2470-2474. IEEE, (2021)Transferable Adversarial Attacks for Deep Scene Text Detection., , , , , and . ICPR, page 8945-8951. IEEE, (2020)Analysis and Measurement of China's Population Health Informatization Development Strategy., , , , , and . MedInfo, volume 264 of Studies in Health Technology and Informatics, page 1388-1392. IOS Press, (2019)SVD-CNN: A Convolutional Neural Network Model with Orthogonal Constraints Based on SVD for Context-Aware Citation Recommendation., , , and . Comput. Intell. Neurosci., (2020)VLMAE: Vision-Language Masked Autoencoder., , , , , , and . CoRR, (2022)How to react to hacker types and asset types in security decision-making., , , and . Expert Syst. Appl., (November 2023)Information security decisions of firms considering security risk interdependency., , , and . Expert Syst. Appl., (2021)