Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E2LLM: Encoder Elongated Large Language Models for Long-Context Understanding and Reasoning., , , , , , and . CoRR, (2024)Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System., , , and . IAT Workshops, page 89-93. IEEE Computer Society, (2006)An Intrusion Detection Model Based on Intention Modeling., , , and . Security and Management, page 24-29. CSREA Press, (2007)Using an improved C4.5 for imbalanced dataset of intrusion., , , , and . PST, volume 380 of ACM International Conference Proceeding Series, page 67. ACM, (2006)Articulation-to-Speech Synthesis Using Articulatory Flesh Point Sensors' Orientation Information., , , , , and . INTERSPEECH, page 3152-3156. ISCA, (2018)Compile-Time Automatic Synchronization Insertion and Redundant Synchronization Elimination for GPU Kernels., , , and . ICPADS, page 826-834. IEEE Computer Society, (2016)Sliding Mode Control of Surface-Mount Permanent-Magnet Synchronous Motor Based on Error Model with Unknown Load., and . J. Softw., 6 (5): 819-825 (2011)Spatiotemporally asynchronous sampled-data control of a linear parabolic PDE on a hypercube., and . Int. J. Control, 95 (12): 3326-3335 (2022)DC renewable connected building grid for intelligent LED lighting system., , , , and . ISIE, page 970-974. IEEE, (2017)A Novel TDS-FDMA Scheme for Multi-User Uplink Scenarios., , , and . GLOBECOM, page 1-5. IEEE, (2010)