Author of the publication

A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.

, , , , and . Int. J. Netw. Manag., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global, regional, and national levels and causes of maternal mortality during 1990–2013: a systematic analysis for the Global Burden of Disease Study 2013, , , , , , , , , and 336 other author(s). The Lancet, (May 2014)A Microblog Hot Topic Detection Algorithm Based on Discrete Particle Swarm Optimization., , , and . PRICAI, volume 9810 of Lecture Notes in Computer Science, page 271-282. Springer, (2016)Experimental Research on Application of Quantum Key in Video Conference System., , , , , , and . Int. J. Online Eng., 14 (4): 70-81 (2018)Microarray analysis and quantitative real-time PCR validation of gene expression during auditory hair cell regeneration in zebrafish (Danio rerio)., , , , , and . BMC Bioinform., (2009)An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System., , , , and . Secur. Commun. Networks, (2018)Global-Local Graph Convolutional Network for cross-modality person re-identification., , , , , and . Neurocomputing, (2021)Robust Face Detection Based on Enhanced Local Sensitive Support Vector Machine., , , , and . CCBR, volume 9428 of Lecture Notes in Computer Science, page 103-111. Springer, (2015)IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps., , , , , and . APSEC, page 202-212. IEEE, (2021)A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks., , and . ICC, page 1-6. IEEE, (2021)DCT: Differential Combination Testing of Deep Learning Systems., , , and . ICANN (3), volume 11729 of Lecture Notes in Computer Science, page 697-710. Springer, (2019)