Author of the publication

Understanding AI Cognition: A Neural Module for Inference Inspired by Human Memory Mechanisms.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on OCR Post-processing Applications for Handwritten Recognition Based on Analysis of Scientific Materials., , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 131-135. Springer, (2011)Acceleration of Naive-Bayes algorithm on multicore processor for massive text classification., , , , , , , and . ISIC, page 344-347. IEEE, (2014)Modeling long-range dependencies in speech data for text-independent speaker recognition., and . ICASSP, page 4825-4828. IEEE, (2008)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Robust face recognition with partially occluded images based on a single or a small number of training samples., , and . ICASSP, page 881-884. IEEE, (2009)Towards 3D Deployment of UAV Base Stations in Uneven Terrain., , , , , , and . ICCCN, page 1-9. IEEE, (2018)On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems., , , , and . ICCCN, page 1-7. IEEE, (2013)Defending against Energy Dispatching Data integrity attacks in smart grid., , , , , and . IPCCC, page 1-8. IEEE Computer Society, (2015)Ordering Problem with Known Capacity in Smart Factory., , , , , , and . ICPS, page 592-596. IEEE, (2019)On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems., , , and . ICC, page 7083-7088. IEEE, (2015)