From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme., , , , , , , , , и 8 other автор(ы). IEEE Trans. Instrum. Meas., (2023)Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory., , , , , , , , , и 9 other автор(ы). CoRR, (2024)Analysis of the Frequency Shift versus Force Gradient of a Dynamic AFM Quartz Tuning Fork Subject to Lennard-Jones Potential Force., , , , и . Sensors, 19 (8): 1948 (2019)Practical continuous-variable quantum key distribution with feasible optimization parameters., , , , , , , , , и 5 other автор(ы). Sci. China Inf. Sci., (августа 2023)用于鲁棒性建模的概率权重极限学习机 (Probabilistic Weighted Extreme Learning Machine for Robust Modeling)., , , и . 计算机科学, 44 (8): 242-245 (2017)Cost-efficient Knowledge-based Question Answering with Large Language Models., , , , , и . CoRR, (2024)Adaptive Popularity Debiasing Aggregator for Graph Collaborative Filtering., , , , , и . SIGIR, стр. 7-17. ACM, (2023)Research on hotspots and trends of zhihu topics based on co-word analysis and social network: a case study of "educational technology"., , , и . ICBDT, стр. 63-68. ACM, (2018)High-speed realization of trivium based on multi-core cryptographic processor., и . ASICON, стр. 1-4. IEEE, (2015)