Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ranking with Slot Constraints., , , and . CoRR, (2023)Error bound analysis of policy iteration based approximate dynamic programming for deterministic discrete-time nonlinear systems., , , , and . IJCNN, page 1-8. IEEE, (2015)Optimizing Gross Merchandise Volume via DNN-MAB Dynamic Ranking Paradigm., , , , and . CoRR, (2017)The Role of Professional Product Reviewers in Evaluating Security and Privacy., , and . USENIX Security Symposium, page 2563-2580. USENIX Association, (2023)Non-dominated sorting differential evolution with improved directional convergence and spread for multiobjective optimization., and . GECCO (Companion), page 87-88. ACM, (2014)Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference., , , , , , and . INFOCOM, page 1-10. IEEE, (2023)Online adaptation of controller parameters based on approximate dynamic programming., , , and . IJCNN, page 256-262. IEEE, (2014)Reactive power control of DFIG wind farm using online supplementary learning controller based on approximate dynamic programming., , , , , and . IJCNN, page 1453-1460. IEEE, (2014)Predicting Polymer Properties Based on Multimodal Multitask Pretraining., , , , , and . CoRR, (2024)Poli-see: An Interactive Tool for Visualizing Privacy Policies., , and . WPES@CCS, page 57-71. ACM, (2020)