From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A DRL based Real-time Computing Load Scheduling Method., , , , , и . ICCE-TW, стр. 1-2. IEEE, (2021)Fraud detection on multi-relation graphs via imbalanced and interactive learning., , , и . Inf. Sci., (2023)Ultrasound Current Source Density Imaging of the Cardiac Activation Wave Using a Clinical Cardiac Catheter., , , , , и . IEEE Trans. Biomed. Eng., 62 (1): 241-247 (2015)Hierarchical Contrast for Unsupervised Skeleton-Based Action Representation Learning., , , , , и . AAAI, стр. 525-533. AAAI Press, (2023)Deep Name Disambiguation by Combining BERT and Orthogonal Constrained Non-negative Matrix Factorization., , и . CCIS, стр. 498-503. IEEE, (2021)PWAGAT: Potential Web attacker detection based on graph attention network., , , и . Neurocomputing, (ноября 2023)MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model., , , и . Comput. Secur., (2023)GraphXSS: An efficient XSS payload detection approach based on graph convolutional network., , , и . Comput. Secur., (2022)UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSDs., , , , , , и . ICA3PP (1), том 13155 из Lecture Notes in Computer Science, стр. 257-270. Springer, (2021)Cross-site Scripting Threat Intelligence Detection Based on Deep Learning., , и . FCS, том 1726 из Communications in Computer and Information Science, стр. 89-104. Springer, (2022)