Author of the publication

Design and Architecture of Dell Acceleration Appliances for Database (DAAD): A Practical Approach with High Availability Guaranteed.

, , , and . HPCC/CSS/ICESS, page 430-435. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resisting Adversarial Examples via Wavelet Extension and Denoising., , , , , and . SmartCom, volume 12608 of Lecture Notes in Computer Science, page 204-214. Springer, (2020)Machine Learning Based Network Censorship., , and . CSCloud/EdgeCom, page 149-154. IEEE, (2021)TGAE: Temporal Graph Autoencoder for Travel Forecasting., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (8): 8529-8541 (August 2023)A Novel Two-Stage Unsupervised Fault Recognition Framework Combining Feature Extraction and Fuzzy Clustering for Collaborative AIoT., , , and . IEEE Trans. Ind. Informatics, 18 (2): 1291-1300 (2022)Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond., , , and . ACM Trans. Sens. Networks, 18 (4): 51e:1-51e:3 (November 2022)DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation., , , , , and . AsiaCCS, page 363-377. ACM, (2021)AI Enhanced Blockchain (II)., , , , and . SmartBlock, page 147-152. IEEE, (2020)News Text Classification Based on MLCNN and BiGRU Hybrid Neural Network., , , , and . SmartBlock, page 137-142. IEEE, (2020)Approximation Algorithms for Reliability-Aware Maximum VoI on AUV-Aided Data Collections., , , , , and . NPC, volume 13615 of Lecture Notes in Computer Science, page 219-230. Springer, (2022)An Edge Trajectory Protection Approach Using Blockchain., , , , and . KSEM, volume 12817 of Lecture Notes in Computer Science, page 647-658. Springer, (2021)