Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network., , , , and . Appl. Intell., 49 (8): 3016-3026 (2019)A New Method for Identifying Essential Proteins Based on Edge Clustering Coefficient., , , and . ISBRA, volume 6674 of Lecture Notes in Computer Science, page 87-98. Springer, (2011)Abnormal event detection in crowd scenes using quaternion discrete cosine transformation signature., , , , and . SPAC, page 42-47. IEEE, (2014)Low Contrast Chinese Rubbing Image Segmentation Based on Gradient Filtering., , , , and . ICIC (1), volume 12463 of Lecture Notes in Computer Science, page 302-310. Springer, (2020)Recovering Connected Error Region Based on Adaptive Error Concealment Order Determination., , and . IEEE Trans. Multim., 11 (4): 683-695 (2009)Combined Channel Estimation with Interference Suppression in CPSS., and . Sensors, 18 (11): 3823 (2018)TDAN: Transferable Domain Adversarial Network for Link Prediction in Heterogeneous Social Networks., , and . ACM Trans. Knowl. Discov. Data, 18 (1): 11:1-11:22 (January 2024)Wavelet integrated attention network with multi-resolution frequency learning for mixed-type wafer defect recognition., and . Eng. Appl. Artif. Intell., (May 2023)Multi-Channel Fusion Attacks., , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (8): 1757-1771 (2017)DCLNet: Dual Closed-loop Networks for face super-resolution., , , , , and . Knowl. Based Syst., (2021)