Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Matchups and Preferences in Context., and . KDD, page 775-784. ACM, (2016)ATSIS: Achieving the Ad hoc Teamwork by Sub-task Inference and Selection., , , and . IJCAI, page 172-179. ijcai.org, (2019)Consistent-estimated eigenvalues based cooperative spectrum sensing for dense cognitive Small Cell Network., , , and . ICC Workshops, page 510-515. IEEE, (2017)ExPO: Exponential-Based Privacy Preserving Online Auction for Electric Vehicles Demand Response in Microgrid., , and . SKG, page 126-131. IEEE, (2017)Oracle approximating shrinkage estimator based cooperative spectrum sensing for dense cognitive small cell network., , , and . ICCC, page 1-6. IEEE, (2017)Towards Optimal Operation State Scheduling in RF-Powered Internet of Things., , , , and . SECON, page 361-369. IEEE, (2018)An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems., , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)Estimating large covariance matrix with network topology for high-dimensional biomedical data., , , , and . Comput. Stat. Data Anal., (2018)The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach., , , , , , , , , and 4 other author(s). AGI, volume 171 of Frontiers in Artificial Intelligence and Applications, page 107-121. IOS Press, (2008)Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics., , , and . SEC, volume 147 of IFIP, page 83-100. Kluwer / Springer, (2004)