Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negative transfer detection in transductive transfer learning., , , , and . Int. J. Mach. Learn. Cybern., 9 (2): 185-197 (2018)Application of Multiple-Population Genetic Algorithm in Optimizing the Train-Set Circulation Plan Problem., , , , and . Complex., (2017)Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems., , , , , and . CoRR, (2019)Real-time walkthrough of outdoor scenes using TRI-view morphing., , , , and . ICIP, page 2921-2925. IEEE, (2017)Improved Consensus Mechanisms Against Censorship Attacks., , , , and . ICPS, page 718-723. IEEE, (2019)Using bidirectional lstm recurrent neural networks to learn high-level abstractions of sequential features for automated scoring of non-native spontaneous speech., , , , , , , , and . ASRU, page 338-345. IEEE, (2015)Look&listen: Multi-Modal Correlation Learning for Active Speaker Detection and Speech Enhancement., , , , , and . IEEE Trans. Multim., (2023)Stateful Memory-Augmented Transformers for Dialogue Modeling., and . CoRR, (2022)CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites., , , , , and . ACM Conference on Computer and Communications Security, page 653-665. ACM, (2016)Recurrent Meta-Structure for Robust Similarity Measure in Heterogeneous Information Networks., , , , , and . ACM Trans. Knowl. Discov. Data, 13 (6): 64:1-64:33 (2019)