Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models for COVID-19 Data Prediction Based on Improved LSTM-ARIMA Algorithms., , , , , , , , and . IEEE Access, (2024)Intrusion Detection Algorithm Based on SDA-ELM., , , , and . IEA/AIE (2), volume 12799 of Lecture Notes in Computer Science, page 495-505. Springer, (2021)QoS-aware Dynamic Fog Service Provisioning., , , , , , , , and . CoRR, (2018)Center of circle after perspective transformation., , and . CoRR, (2019)Statistical Sharing of Primary and Back-Up Capacity in Survivable Elastic Optical Networks., , , , , , and . GLOBECOM, page 1-6. IEEE, (2017)Statistical Capacity Sharing for Variable-Rate Connections in Flexible Grid Optical Networks., , , , , , , and . GLOBECOM, page 1-6. IEEE, (2015)Regenerator pool site selection for mixed line rate optical networks., , , , , , and . ICC, page 3084-3088. IEEE, (2012)Deepfake Caricatures: Amplifying attention to artifacts increases deepfake detection by humans and machines., , , , , and . CoRR, (2022)A Social-aware Gaussian Pre-trained Model for Effective Cold-start Recommendation., , , and . CoRR, (2023)RHOBIN Challenge: Reconstruction of Human Object Interaction., , , , , , , , , and 10 other author(s). CoRR, (2024)