Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)A Pipeline Optimization Model for QKD Post-processing System., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 472-481. Springer, (2014)First Request First Service Entanglement Routing Scheme for Quantum Networks., , , , , , and . Entropy, 24 (10): 1404 (2022)A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)Progress in climate prediction and weather forecast operations in China, , , and . Advances in Atmospheric Sciences, 29 (5): 943--957 (Sep 1, 2012)An Efficient Approach for Outlier Detection with Imperfect Data Labels., , , , and . IEEE Trans. Knowl. Data Eng., 26 (7): 1602-1616 (2014)Distributed Inexact Newton-type Pursuit for Non-convex Sparse Learning., , , , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 343-352. PMLR, (2019)Anonymized BERT: An Augmentation Approach to the Gendered Pronoun Resolution Challenge.. CoRR, (2019)Deep Neural Networks for High Dimension, Low Sample Size Data., , , and . IJCAI, page 2287--2293. (2017)