From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security testing of web applications: a search-based approach for detecting SQL injection vulnerabilities., , и . GECCO (Companion), стр. 417-418. ACM, (2019)Quantitative Relationship Model of Express Service Network and Service Facilities in Beijing., , и . SMC, стр. 312-317. IEEE, (2019)Compare Learning: Bi-Attention Network for Few-Shot Learning., , , и . ICASSP, стр. 2233-2237. IEEE, (2020)Research on the Application of Gamification Design Methods in IoP-Based System., , и . ICIS, стр. 274-278. IEEE, (2019)The Public Opinion Analysis of Chinese and Foreign Remake Movies., , и . ICIS, стр. 375-380. IEEE, (2019)Real-Time Reliable Classification of Hand Gesture Using Support Vector Machine., и . RCAR, стр. 209-212. IEEE, (2019)An Evolutionary Many-Objective Optimization Algorithm Based on Dominance and Decomposition., , , и . IEEE Trans. Evol. Comput., 19 (5): 694-716 (2015)Maximum Torque per Ampere (MTPA) Control for IPMSM Drives Using Signal Injection and an MTPA Control Law., и . IEEE Trans. Ind. Informatics, 15 (10): 5588-5598 (2019)Interrelationship-Based Selection for Decomposition Multiobjective Optimization., , , и . IEEE Trans. Cybern., 45 (10): 2076-2088 (2015)Scale-Aware Deep Network with Hole Convolution for Blind Motion Deblurring., , и . ICME, стр. 658-663. IEEE, (2019)