Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Decision Support Approach to Liquidate a Distressed Debt Network., , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (4): 1242-1251 (2020)Nested Named Entity Recognition Based on Multi-word Fusion and Boundary Detection., , , , and . CyberC, page 92-95. IEEE, (2023)PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing., , , , , and . IWQoS, page 1-10. IEEE, (2022)Connectivity, Netting, and Systemic Risk of Payment Systems., and . IEEE Syst. J., 13 (2): 1658-1668 (2019)Rotation Invariant Texture Classification Algorithm Based on DT-CWT and SVM., , , and . ISNN (3), volume 4493 of Lecture Notes in Computer Science, page 454-460. Springer, (2007)Compressed sensing magnetic resonance imaging based on dictionary updating and block-matching and three-dimensional filtering regularisation., , and . IET Image Process., 10 (1): 68-79 (2016)A Distributed Privacy-Preserving Learning Dynamics in General Social Networks., , , , , and . CoRR, (2020)Communication Resources Limited Decentralized Learning with Privacy Guarantee through Over-the-Air Computation., , , , , , and . MobiHoc, page 201-210. ACM, (2023)Resource-Adaptive Newton's Method for Distributed Learning., , , , and . COCOON (1), volume 14422 of Lecture Notes in Computer Science, page 335-346. Springer, (2023)5G UE Network Slicing based on SDK Implementation and Field Test., , , , , , and . CNIOT, page 151-157. IEEE, (2022)