Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Non-Intrusive Method for Smart Speaker Forensics., , , , , and . ICC, page 1-6. IEEE, (2021)RepBNN: towards a precise Binary Neural Network with Enhanced Feature Map via Repeating., , , , , , , and . CoRR, (2022)SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes., , , , , , and . RAID, page 33-47. ACM, (2021)PBCStereo: A Compressed Stereo Network with Pure Binary Convolutional Operations., , , , , , and . ACCV (3), volume 13843 of Lecture Notes in Computer Science, page 626-641. Springer, (2022)Analyzing Android Application in Real-Time at Kernel Level., , , , and . ICCCN, page 1-9. IEEE, (2017)A Method of Mask-Wearing Detection Based on Improved YOLOv4., , and . EITCE, page 1317-1321. ACM, (2022)Stability of the minimum energy path., , and . Numerische Mathematik, 156 (1): 39-70 (February 2024)Geological adaptive intelligent control of earth pressure balance shield machine based on deep reinforcement learning., , , , and . Artif. Intell. Rev., 57 (8): 219 (August 2024)Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks., , , , and . GLOBECOM, page 1-7. IEEE, (2018)Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction., , , , , and . GLOBECOM, page 1-6. IEEE, (2021)