Author of the publication

A Phase-Locking Analysis of Neuronal Firing Rhythms with Transcranial Magneto-Acoustical Stimulation Based on the Hodgkin-Huxley Neuron Model.

, , , , and . Frontiers Comput. Neurosci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using pretraining and text mining methods to automatically extract the chemical scientific data., , , and . Data Technol. Appl., 56 (2): 205-222 (2022)Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System., , , and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 592-602. Springer, (2020)A Phase-Locking Analysis of Neuronal Firing Rhythms with Transcranial Magneto-Acoustical Stimulation Based on the Hodgkin-Huxley Neuron Model., , , , and . Frontiers Comput. Neurosci., (2017)An Android System Vulnerability Risk Evaluation Method for Heap Overflow., , , and . ES, page 89-96. IEEE Computer Society, (2016)Analyzing Customer's Product Preference Using Wireless Signals., , , , , and . KSEM, volume 10412 of Lecture Notes in Computer Science, page 139-148. Springer, (2017)The Entity Analysis of Social Networks in Weibo with Suicidal Tendencies Based on Bert., , and . BDE, page 125-130. ACM, (2021)An uncertain aggregate production planning model for vegetables., and . ICNC-FSKD, page 1386-1395. IEEE, (2017)Transfer Learning for Scientific Data Chain Extraction in Small Chemical Corpus with joint BERT-CRF Model., , , and . BIRNDL@SIGIR, volume 2414 of CEUR Workshop Proceedings, page 28-41. CEUR-WS.org, (2019)Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System., , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 352-362. Springer, (2017)A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device., , and . TrustCom/BigDataSE/ISPA (1), page 990-998. IEEE, (2015)