From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Empirical Studies of Three Commonly Used Process Mining Algorithms., , , и . SMC, стр. 2492-2499. IEEE, (2021)MI-FGSM on Faster R-CNN Object Detector., , , , , и . ICVIP, стр. 27-32. ACM, (2020)SMDAF: A novel keypoint based method for copy-move forgery detection., , , , , и . IET Image Process., 16 (13): 3589-3602 (2022)Spatio-Temporal Modeling for Flash Memory Channels Using Conditional Generative Nets., , , и . DATE, стр. 1-6. IEEE, (2023)31.11 A Capacitor-Based Bias-Flip Rectifier with Electrostatic Charge Boosting for Triboelectric Energy Harvesting Achieving Auto-MPPT at Breakdown Voltage and 14× Power Extraction Improvement., , , и . ISSCC, стр. 516-518. IEEE, (2024)A 70-V Fully Integrated Dual-SSHC Rectifier for Triboelectric Energy Harvesting with Full-Digital Duty-Cycle-Based MPPT Achieving 598% Power Extraction Enhancement., , , , и . CICC, стр. 1-2. IEEE, (2024)Using Event Log Timing Information to Assist Process Scenario Discoveries., , , и . AIKE, стр. 58-64. IEEE, (2020)Radar Update (RUPT): A Pedestrian Navigation System with Enhanced Trajectory Performance., , , , , , и . ISCAS, стр. 1-5. IEEE, (2021)On periodic scheduling of fixed-slot bandwidth reservations for big data transfer., , , , , и . LCN, стр. 587-594. IEEE Computer Society, (2015)EnsembleFool: A method to generate adversarial examples based on model fusion strategy., , , , , , и . Comput. Secur., (2021)