Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Koji Making Disc Machine Control System in Soy Sauce., and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 648-655. Springer, (2011)Low-Power Noise-Immune Nanoscale Circuit Design Using Coding-Based Partial MRF Method., , , , , , , and . IEEE J. Solid State Circuits, 53 (8): 2389-2398 (2018)Online Prediction of Cutting Temperature Using Self-Adaptive Local Learning and Dynamic CNN., , , , and . IEEE Trans. Ind. Informatics, 18 (12): 8629-8640 (2022)Adversarial Attacks on Skeleton-Based Sign Language Recognition., , , , and . ICIRA (1), volume 14267 of Lecture Notes in Computer Science, page 33-43. Springer, (2023)Compensation Buffer Sizing for Providing User-Level QoS Guarantee of Media Flows., , , and . ICC, page 90-94. IEEE, (2008)WiDual: User Identified Gesture Recognition Using Commercial WiFi., , , , , and . CCGrid, page 673-683. IEEE, (2023)Analysis of the Centralized Algorithm and the Distributed Algorithm for Parallel Packet Switch., , , and . PDCAT, page 156-161. IEEE Computer Society, (2006)A YOLOv7-Based Defect Detection Method for Metal Surfaces., , , , and . ICIC (6), volume 14867 of Lecture Notes in Computer Science, page 473-483. Springer, (2024)FactFinders at CheckThat! 2024: Refining Check-worthy Statement Detection with LLMs through Data Pruning., , and . CLEF (Working Notes), volume 3740 of CEUR Workshop Proceedings, page 520-537. CEUR-WS.org, (2024)Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage., , , , and . TrustCom, page 141-148. IEEE, (2023)