Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Bitcoin Users Using Deep Neural Network., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 178-192. Springer, (2018)Adaptive Kalman Filtered Compressive Sensing for Streaming Signals., , , and . VTC Fall, page 1-5. IEEE, (2013)Innovative Talent Cultivation Pattern of Software Engineering under Internet Plus., , , , and . ICCSE, page 180-183. IEEE, (2019)General Functional Matrix Factorization Using Gradient Boosting., , , and . ICML (1), volume 28 of JMLR Workshop and Conference Proceedings, page 436-444. JMLR.org, (2013)Corrugated Pipe Defect Detection Based on Digital Image Processing., , , , , , and . ICSAI, page 962-966. IEEE, (2018)Collision Free Navigation of a Flying Robot for Underground Mine Search and Mapping., , and . ROBIO, page 1102-1106. IEEE, (2018)Improved Integral Attack on Reduced-Round Simeck., , and . IEEE Access, (2019)The Fourth ACM International Conference on Web Search and Data Mining (WSDM 2011)., and . SIGWEB Newsl., 2011 (Summer): 1:1-1:4 (2011)PathAFL: Path-Coverage Assisted Fuzzing., , , , and . AsiaCCS, page 598-609. ACM, (2020)A low cost interpolation based detection algorithm for medium-size massive MIMO-OFDM systems., , , and . ISCIT, page 1-5. IEEE, (2017)