Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fullerene Adducts Bearing Cyano Moiety for Both High Dielectric Constant and Good Active Layer Morphology of Organic Photovoltaics, , , and . Advanced Functional Materials, 26 (33): 6107--6113 (2016)Analysis of a discontinuous Galerkin method for the bending problem of Koiter shell.. Numerische Mathematik, 133 (2): 333-370 (2016)Deriving Private Information from Randomly Perturbed Ratings., , and . SDM, page 59-69. SIAM, (2006)Solve the General Constrained Optimal Control Problem with Common Integration Method., and . CoRR, (2018)Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks., , , , and . ISLPED, page 5:1-5:6. ACM, (2018)Symbolic computation and new families of exact non-travelling wave solutions of (2?+?1)-dimensional Konopelchenko-Dubrovsky equations. Chaos, Solitons & Fractals, 31 (4): 951--959 (February 2007)Analysis of a low-dimensional linear model under recommendation attacks., , , and . SIGIR, page 517-524. ACM, (2006)First investigation of universal speech attributes for speaker verification., , and . ISCSLP, page 1-5. IEEE, (2016)Robust License Plate Recognition With Shared Adversarial Training Network., , , and . IEEE Access, (2020)Preconditioned GMRES methods for discretization equation of nonsymmetric and indefinite elliptic problem.. Appl. Math. Comput., 158 (2): 307-317 (2004)