Author of the publication

Research on Double Threshold Reconstruction Algorithm Based on 1-Bit Compression Sensing.

, , , and . EITCE, page 1873-1877. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Innovation Index System Based on Principal Component Analysis: Evidence from Shenzhen., , , and . ICEME, page 139-144. ACM, (2020)Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT., , , , , and . IEEE Trans. Ind. Informatics, 16 (9): 6182-6192 (2020)Characterizing superspreading potential of infectious disease: Decomposition of individual transmissibility., , , , , , , , , and 1 other author(s). PLoS Comput. Biol., (2022)Locally Linear Embedding for High-Frequency Trading Marker Discovery., , , , , and . IDMB, volume 1099 of Communications in Computer and Information Science, page 3-17. Springer, (2019)Target-based Resource Allocation for Deep Learning Applications in a Multi-tenancy System., , , , , , and . HPEC, page 1-7. IEEE, (2019)A fisheye distortion correction method based on deep learning., , , and . EITCE, page 1499-1503. ACM, (2022)X-Ray Image Compression Using Variational Auto-encoder., , , and . EITCE, page 1277-1281. ACM, (2022)Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization Algorithm., , , , and . CNML, page 425-431. ACM, (2023)Content-Insensitive Dynamic Lip Feature Extraction for Visual Speaker Authentication Against Deepfake Attacks., and . ICASSP, page 1-5. IEEE, (2023)Improving knowledge distillation via pseudo-multi-teacher network., , , and . Mach. Vis. Appl., 34 (2): 33 (March 2023)