Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of Digital Elevation Model in the Coverage Network Planning Software., and . IFTC, volume 331 of Communications in Computer and Information Science, page 328-332. Springer, (2012)Multiple sources' direction finding by using reliable component on phase difference manifold and kernel density estimator., , and . ICASSP, page 2601-2604. IEEE, (2012)The System for Extracting Crime Elements and Predicting Excavation-Type Heritage Crimes Based on Deep Learning Models., , , , and . Syst., 11 (6): 289 (2023)Terrain-perception-free Quadrupedal Spinning Locomotion on Versatile Terrains: Modeling, Analysis, and Experimental Validation., , , , , , , , , and 1 other author(s). CoRR, (2021)Improving Task Generalization via Unified Schema Prompt., , , , , , , and . CoRR, (2022)PTR: Prompt Tuning with Rules for Text Classification., , , , and . CoRR, (2021)High-Payload Online Identification and Adaptive Control for an Electrically-actuated Quadruped Robot., , , , , , , and . CoRR, (2021)Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds., , and . IACR Cryptol. ePrint Arch., (2009)Indoor millimeter wave D2D communication resource optimization based on improved PMVC and CTRA algorithms., , and . J. Comput. Methods Sci. Eng., 23 (5): 2549-2562 (2023)Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 169-191. Springer, (2022)