Author of the publication

A 5G Cloud Platform and Machine Learning-Based Mobile Automatic Recognition of Transportation Infrastructure Objects.

, , , , , , , , , and . IEEE Wirel. Commun., 30 (2): 76-81 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location optimization of a competitive distribution center for urban cold chain logistics in terms of low-carbon emissions., , , and . Comput. Ind. Eng., (2021)Learn to Segment Retinal Lesions and Beyond., , , , , , , , , and 1 other author(s). ICPR, page 7403-7410. IEEE, (2020)Query Expansion with Semantic-Based Ellipsis Reduction for Conversational IR., , , , , , , and . TREC, volume 1266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2020)An Intelligent Robust Networking Mechanism for the Internet of Things., , , , and . IEEE Commun. Mag., 57 (11): 91-95 (2019)A Deep Learning Method for Pavement Crack Identification Based on Limited Field Images., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 22156-22165 (2022)Global Context-Based Multilevel Feature Fusion Networks for Multilabel Remote Sensing Image Scene Classification., , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)Towards Revenue-Driven Multi-User Online Task Offloading in Edge Computing., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (5): 1185-1198 (2022)Learning-Based Client Selection for Federated Learning Services Over Wireless Networks with Constrained Monetary Budgets., , , , and . CoRR, (2022)Ontology-based venous thromboembolism risk assessment model developing from medical records., , , , , and . BMC Medical Informatics Decis. Mak., 19-S (4): 151:1-151:13 (2019)A robust hashing algorithm based on SURF for video copy detection., , and . Comput. Secur., 31 (1): 33-39 (2012)