Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top Invulnerability Nodes Mining in Dual-Direction Different-Weight Complex Network Based on Node Double-Level Local Structure Weighted Entropy., , , and . IEEE Access, (2019)Shape decomposition and understanding of point cloud objects based on perceptual information., , , and . VRCAI, page 199-206. ACM, (2010)Spectral Dictionary Learning Based Multispectral Image Compression., , , , , and . Edutainment, volume 11462 of Lecture Notes in Computer Science, page 140-144. Springer, (2018)Latent Topic Model Based Multi-feature Learning for PolSAR Terrain Classification., , , , and . Edutainment, volume 11462 of Lecture Notes in Computer Science, page 249-252. Springer, (2018)Generative Evolutionary Anomaly Detection in Dynamic Networks., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (12): 12234-12248 (December 2023)Development of large-scale TCM corpus using hybrid named entity recognition methods for clinical phenotype detection: An initial study., , , , , and . CIBD, page 84-90. IEEE, (2014)A Feature Selection Approach Based on Interclass and Intraclass Relative Contributions of Terms., , , and . Comput. Intell. Neurosci., (2016)Interacting Multiple Model Based on Maximum Correntropy Kalman Filter., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (8): 3017-3021 (2021)An Effective and Robust Framework by Modeling Correlations of Multiplex Network Embedding., , , , and . ICDM, page 1144-1149. IEEE, (2021)Comprehensive identification of operational risk factors based on textual risk disclosures., , , and . ITQM, volume 139 of Procedia Computer Science, page 136-143. Elsevier, (2018)