From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revisiting why Kad lookup fails., , , , , и . P2P, стр. 37-42. IEEE, (2012)On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims., и . ICICA (1), том 105 из Communications in Computer and Information Science, стр. 54-61. Springer, (2010)An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition., , , , и . ISCSLP, стр. 384-388. IEEE, (2018)Deep Learning-based Moving Object Segmentation: Recent Progress and Research Prospects., , , , , и . Int. J. Autom. Comput., 20 (3): 335-369 (2023)Mining Constrained Gradients in Large Databases., , , , , и . IEEE Trans. Knowl. Data Eng., 16 (8): 922-938 (2004)Large-Scale Third-Party Library Detection in Android Markets., , , , , , , , и . IEEE Trans. Software Eng., 46 (9): 981-1003 (2020)End-to-end Flow Correlation Tracking with Spatial-temporal Attention., , , и . CoRR, (2017)Analyzing Robustness of End-to-End Neural Models for Automatic Speech Recognition., и . CoRR, (2022)Dual Mean-Teacher: An Unbiased Semi-Supervised Framework for Audio-Visual Source Localization., , , , , , , и . CoRR, (2024)CAMFuzz: Explainable Fuzzing with Local Interpretation., , , , , , и . Cybersecur., 5 (1): 17 (2022)