Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Ideological and Political Education of College Students Based on Network Information Security., , , , and . ICIC (1), volume 12463 of Lecture Notes in Computer Science, page 458-467. Springer, (2020)EnlightenGAN: Deep Light Enhancement without Paired Supervision, , , , , , , , and . (2019)cite arxiv:1906.06972.UAV Dynamic Non-Terrestrial Transmission Channel Analysis Based on SSCM-RT Model., , , and . Symmetry, 15 (10): 1955 (October 2023)A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata., , , , and . Inf. Sci., (2022)Reading Digital Numbers of Water Meter with Deep Learning Based Object Detector., , , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 38-49. Springer, (2019)Exploring RNN-Transducer for Chinese speech recognition., , , , and . APSIPA, page 1364-1369. IEEE, (2019)An Online Attention-Based Model for Speech Recognition., , , , and . INTERSPEECH, page 4390-4394. ISCA, (2019)JPAS: Job-progress-aware flow scheduling for deep learning clusters., , , , and . J. Netw. Comput. Appl., (2020)Blockchain-Governed Federated Transfer Learning for Secure Internet of Drones Networks., , , , and . IEEE Internet Things Mag., 5 (3): 134-139 (2022)3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack., , , , , and . CoRR, (2023)