Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Trivariate B-splines with Positive Jacobian by Pillow Operation and Geometric Iterative Fitting., , and . CoRR, (2018)A Parallel Intrusion Detection System for High-Speed Networks., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 439-451. Springer, (2004)Automating Angle Measurements on Foot Radiographs in Young Children: Feasibility and Performance of a Convolutional Neural Network Model., , , , , , , , , and 2 other author(s). J. Digit. Imaging, 36 (4): 1419-1430 (August 2023)Towards Independence Criterion in Machine Unlearning of Features and Labels., , , , and . CoRR, (2024)CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes., , , , , , , , and . CoRR, (2021)A novel data-driven approach on inferring loop invariants for C programs., , , , and . J. Comput. Lang., (2022)Divisible load scheduling algorithm in a virtual distributed computing system. Nanyang Technological University, Singapore, (2016)Induced subgraphs of hypercubes and a proof of the Sensitivity Conjecture. (2019)cite arxiv:1907.00847.Commodity query by snapping., , , , and . SIGIR, page 985-988. ACM, (2013)GMAC: A Seed-Insensitive Approach to Local Community Detection., , , , , and . DaWaK, volume 8057 of Lecture Notes in Computer Science, page 297-308. Springer, (2013)