Author of the publication

AFM Nanomanipulation with Tip Morphology Estimation and Positioning Compensation.

, , , , , and . NEMS, page 534-539. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

METNet: A Mutual Enhanced Transformation Network for Aspect-based Sentiment Analysis., , , , , and . COLING, page 162-172. International Committee on Computational Linguistics, (2020)Measuring system for mobile robot based on multiple sensors., , and . EMEIT, page 980-983. IEEE, (2011)Study on Continuous Internal Audit System Modeling and Application., , and . AIAM (ACM), page 33:1-33:6. ACM, (2019)Backup sourcing with capacity reservation under uncertain disruption risk and minimum order quantity., , and . Comput. Ind. Eng., (2017)Mechanism of Using Activated Carbon for Mercury Removal in Flue Gas., and . ESIAT (1), page 198-201. IEEE Computer Society, (2009)Sequential detection of RGPO in target tracking by decomposition and fusion approach., , , and . FUSION, page 1800-1807. IEEE, (2012)UAC: Offline Reinforcement Learning With Uncertain Action Constraint., , , , , , and . IEEE Trans. Cogn. Dev. Syst., 16 (2): 671-680 (April 2024)Economics of Strategic Network Infrastructure Sharing: A Backup Reservation Approach., , , , and . IEEE/ACM Trans. Netw., 29 (2): 665-680 (2021)A Context-based Support System of Mobile Chinese Learning for Foreigners in China., , , and . KES, volume 60 of Procedia Computer Science, page 1396-1405. Elsevier, (2015)Pricing Strategies in Cybersecurity Markets with Network Effects., , and . CCNC, page 1-4. IEEE, (2025)