Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities., , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 292-303. Springer, (2020)Computer-Aided English Education in China: An Online Automatic Essay Scoring System., , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 264-278. Springer, (2020)Ramp Merging of Connected Vehicle With Virtual Platooning Control., , , , and . ChineseCSCW (1), volume 1681 of Communications in Computer and Information Science, page 207-216. Springer, (2022)Recovering NB-IoT Signal from Legacy LTE Interference via K-means Clustering., , and . VTC Spring, page 1-5. IEEE, (2021)Deep Learning-Enhanced Physical Layer Authentication for Mobile Devices., , and . GLOBECOM, page 826-831. IEEE, (2023)Spike-NeRF: Neural Radiance Field Based On Spike Camera., , , , , , and . CoRR, (2024)SpikeGS: Reconstruct 3D scene via fast-moving bio-inspired sensors., , , and . CoRR, (2024)A Simple Federated Learning-Based Scheme for Security Enhancement Over Internet of Medical Things., , , , , and . IEEE J. Biomed. Health Informatics, 27 (2): 652-663 (February 2023)SCSim: A Realistic Spike Cameras Simulator., , , and . CoRR, (2024)