From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Joint-Semantics Reconstructing Hashing for Large-Scale Unsupervised Cross-Modal Retrieval., , и . ICCV, стр. 3027-3035. IEEE, (2019)Pangolin: speeding up concurrent messaging for cloud-based social gaming., , , , , , , , и . CoNEXT, стр. 23. ACM, (2011)Fast Inbound Top-K Query for Random Walk with Restart., , , , и . ECML/PKDD (2), том 9285 из Lecture Notes in Computer Science, стр. 608-624. Springer, (2015)New Degrees of Freedom for Beamforming Manipulation in MIMO Transmission with OAM., , , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2019)Poster: Evolution of Ethereum: A Temporal Graph Perspective., , , , и . Networking, стр. 652-654. IEEE, (2020)Energy-Efficient MIMO Multiuser Systems: Nash Equilibrium Analysis., , , , и . UNet, том 12293 из Lecture Notes in Computer Science, стр. 68-81. Springer, (2019)Structured discriminative models using deep neural-network features., , , , , и . ASRU, стр. 160-166. IEEE, (2015)Active Disturbance Rejection Controller for Speed Control of Electrical Drives Using Phase-Locking Loop Observer., , , , , и . IEEE Trans. Ind. Electron., 66 (3): 1748-1759 (2019)DPLink: User Identity Linkage via Deep Neural Network From Heterogeneous Mobility Data., , , , , , и . WWW, стр. 459-469. ACM, (2019)POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities., , и . ACM Conference on Computer and Communications Security, стр. 1529-1531. ACM, (2014)