Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E2LLM: Encoder Elongated Large Language Models for Long-Context Understanding and Reasoning., , , , , , and . CoRR, (2024)Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System., , , and . IAT Workshops, page 89-93. IEEE Computer Society, (2006)An Intrusion Detection Model Based on Intention Modeling., , , and . Security and Management, page 24-29. CSREA Press, (2007)Articulation-to-Speech Synthesis Using Articulatory Flesh Point Sensors' Orientation Information., , , , , and . INTERSPEECH, page 3152-3156. ISCA, (2018)Compile-Time Automatic Synchronization Insertion and Redundant Synchronization Elimination for GPU Kernels., , , and . ICPADS, page 826-834. IEEE Computer Society, (2016)Using an improved C4.5 for imbalanced dataset of intrusion., , , , and . PST, volume 380 of ACM International Conference Proceeding Series, page 67. ACM, (2006)Spatiotemporally asynchronous sampled-data control of a linear parabolic PDE on a hypercube., and . Int. J. Control, 95 (12): 3326-3335 (2022)Sliding Mode Control of Surface-Mount Permanent-Magnet Synchronous Motor Based on Error Model with Unknown Load., and . J. Softw., 6 (5): 819-825 (2011)DC renewable connected building grid for intelligent LED lighting system., , , , and . ISIE, page 970-974. IEEE, (2017)Relative entropy of DNA and its application, and . Physica A: Statistical Mechanics and its Applications, (Mar 1, 2005)