Author of the publication

Improve the LSTM and GRU model for small training data by wavelet transformation.

, , , , and . IJCNN, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic map-based three-party authenticated key agreement.. Secur. Commun. Networks, 7 (12): 2469-2474 (2014)The Universal Design Model of Set Top Box., and . HCI (11), volume 4560 of Lecture Notes in Computer Science, page 98-102. Springer, (2007)Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System., , and . KSII Trans. Internet Inf. Syst., 8 (3): 1157-1177 (2014)Designing "Height" into Daily Used Products - A Case Study of Universal Design., , , , and . HCI (5), volume 4554 of Lecture Notes in Computer Science, page 207-216. Springer, (2007)A Secure Certificateless Multi-signature Scheme for Wireless Sensor Networks., , and . ICMLSC, page 116-121. ACM, (2024)On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings., , and . ICTCE, page 61-65. ACM, (2017)On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.. J. Medical Systems, 37 (2): 9929 (2013)New identity-based key-insulated convertible multi-authenticated encryption scheme., and . J. Netw. Comput. Appl., 34 (5): 1724-1731 (2011)An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments., , , and . Sensors, 22 (11): 4223 (2022)On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme., , and . ICS, volume 1013 of Communications in Computer and Information Science, page 550-558. Springer, (2018)