Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ICT self-efficacy mediates most effects of university ICT support on preservice teachers' TPACK: Evidence from three normal universities in China., and . Br. J. Educ. Technol., 52 (6): 2319-2339 (2021)Get a Head Start: Targeted Labeling at Source with Limited Annotation Overhead for Semi-Supervised Learning., , , , , , , and . ICME, page 1805-1810. IEEE, (2023)Improving Zero-Shot Entity Linking Candidate Generation with Ultra-Fine Entity Type Information., , , , , , and . COLING, page 2429-2437. International Committee on Computational Linguistics, (2022)Not All Classes are Equal: Adaptively Focus-Aware Confidence for Semi-Supervised Object Detection., , , , and . ICASSP, page 1-5. IEEE, (2023)MADI: Inter-Domain Matching and Intra-Domain Discrimination for Cross-Domain Speech Recognition., , , , and . ICASSP, page 1-5. IEEE, (2023)Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion., , , , and . AINA, page 546-551. IEEE Computer Society, (2009)Adj-MOT: Multi-object Tracking by ReID with Adjacent Frame Enhancement., , , , and . IJCNN, page 1-10. IEEE, (2024)Transient Interference Excision in Over-the-Horizon Radar by Robust Principal Component Analysis With a Structured Matrix., , and . IEEE Geosci. Remote. Sens. Lett., 13 (1): 48-52 (2016)Respiration Symptoms Monitoring in Body Area Networks, , , and . Applied Sciences, 8 (4): 568 (April 2018)Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum., , and . AINA Workshops, page 1-6. IEEE Computer Society, (2017)