Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities., , , , , and . TrustCom, page 131-138. IEEE, (2022)The piecewise-constant optimal control of nonlinear neutral system with control constraints., and . ICIA, page 1258-1263. IEEE, (2015)DWUPP: Dynamic Weight Update through Pipelined Parallel for Distributed Training Model., , , , , and . CBD, page 58-63. IEEE, (2021)A new rough set model based on multi-scale covering., , , , and . Int. J. Mach. Learn. Cybern., 12 (1): 243-256 (2021)A Federated Learning Backdoor Attack Defense., , , , and . BigDataService, page 143-148. IEEE, (2022)LODM: Large-scale Online Dense Mapping for UAV., , , , , and . IROS, page 2281-2288. IEEE, (2022)A Reliable and Energy Efficient Superposition Modulation and SVD-Aided Detection Based Multiuser OFDM-DCSK Paired Transceiver for IoT Devices., , , , , , , and . IEEE Trans. Commun., 72 (3): 1444-1456 (March 2024)RoadFormer+: Delivering RGB-X Scene Parsing through Scale-Aware Information Decoupling and Advanced Heterogeneous Feature Fusion., , , , , , and . CoRR, (2024)DNN Training Optimization with Pipelined Parallel Based on Feature Maps Encoding., , , , and . CBD, page 36-41. IEEE, (2022)Request-Aware Task Offloading in Mobile Edge Computing via Deep Reinforcement Learning., , , , and . CBD, page 294-299. IEEE, (2022)