Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense., , and . IEEE Trans. Ind. Informatics, 20 (2): 2702-2714 (February 2024)Verification of cryptocurrency consensus protocols: reenterable colored Petri net model design., , , and . Int. J. Parallel Emergent Distributed Syst., 39 (1): 32-50 (January 2024)Deep learning for image restoration and enhancement. University of Illinois Urbana-Champaign, USA, (2018)A Blockchain-Based Security Model for IoT Systems., , and . J. Inf. Knowl. Manag., 21 (2): 2250004:1-2250004:18 (2022)Computers do better than experts matching faces in a large population., , , and . IEEE ICCI, page 280-284. IEEE Computer Society, (2010)Nonlinear optimal trade-off control for LQG problem., , , and . ACC, page 1931-1936. IEEE, (2010)Distributed Exact Structural Clustering on Large Graph., , , and . ICPADS, page 778-785. IEEE, (2022)AdaFormer: Efficient Transformer with Adaptive Token Sparsification for Image Super-resolution., , , , , , and . AAAI, page 4009-4016. AAAI Press, (2024)Scale-wise Convolution for Image Restoration., , , and . CoRR, (2019)Model of Gradient Boosting Random Forest Prediction., , and . ICNSC, page 1-6. IEEE, (2022)