From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attentional Fused Temporal Transformation Network for Video Action Recognition., , , , , , , , и . ICASSP, стр. 4377-4381. IEEE, (2020)Enhanced Visual Loop Closing for Laser-Based SLAM., , и . ASAP, стр. 1-4. IEEE Computer Society, (2018)LLM-Based Processor Verification: A Case Study for Neuronnorphic Processor., , , , , , , , , и . DATE, стр. 1-6. IEEE, (2024)Policy-Customized: A New Abstraction for Building Security as a Service., , , , и . ISPAN-FCST-ISCC, стр. 203-210. IEEE Computer Society, (2017)Efficient maintenance for maximal bicliques in bipartite graph streams., , , , , и . World Wide Web, 25 (2): 857-877 (2022)Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention., , , , и . ICDF2C, том 441 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 248-264. Springer, (2021)A Distributed Parallel Resampling Algorithm for Large Images., , , и . APPT, том 2834 из Lecture Notes in Computer Science, стр. 608-618. Springer, (2003)Data Space Fusion Based Approach for Effective Alignment of Computation and Data., , и . APPT, том 2834 из Lecture Notes in Computer Science, стр. 215-225. Springer, (2003)Cloud-Oriented SAT Solver Based on Obfuscating CNF Formula., , , и . APWeb Workshophs, том 8710 из Lecture Notes in Computer Science, стр. 188-199. Springer, (2014)Research on Linux Trusted Boot Method Based on Reverse Integrity Verification., , , , , и . Sci. Program., (2016)