Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ranking algorithm based on relational topic model., , , and . IJCNN, page 1-8. IEEE, (2015)A Denoising Framework for Image Caption., , , and . DASC/PiCom/DataCom/CyberSciTech, page 825-832. IEEE, (2019)Android Malware Detection Method Based on Function Call Graphs., , and . ICONIP (4), volume 9950 of Lecture Notes in Computer Science, page 70-77. (2016)Genre identification of Chinese finance text using machine learning method., , , and . SMC, page 455-459. IEEE, (2008)Object retrival based on visual word pairs., , , and . ICIP, page 1929-1932. IEEE, (2012)Source Detection Method Based on Propagation Probability., , , and . ICCC, volume 10971 of Lecture Notes in Computer Science, page 179-186. Springer, (2018)An Airborne Software FMEA Application Method Based on ARP4761., , , , , and . ICMSS, page 32-38. ACM, (2019)A Malware Family Classification Method Based on the Point Cloud Model DGCNN., , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 210-221. Springer, (2021)The Gift of Feedback: Improving ASR Model Quality by Learning from User Corrections Through Federated Learning., , , , , , , and . ASRU, page 1-7. IEEE, (2023)A fast malware detection algorithm based on objective-oriented association mining., , , , and . Comput. Secur., (2013)