Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition., , , , and . ISCSLP, page 384-388. IEEE, (2018)On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims., and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 54-61. Springer, (2010)Revisiting why Kad lookup fails., , , , , and . P2P, page 37-42. IEEE, (2012)Deep Learning-based Moving Object Segmentation: Recent Progress and Research Prospects., , , , , and . Int. J. Autom. Comput., 20 (3): 335-369 (2023)CAMFuzz: Explainable Fuzzing with Local Interpretation., , , , , , and . Cybersecur., 5 (1): 17 (2022)How many eyes are spying on your shared folders?, , , , and . WPES, page 109-116. ACM, (2012)A Further Study of Unsupervised Pretraining for Transformer Based Speech Recognition., , , , , , , , and . ICASSP, page 6538-6542. IEEE, (2021)Didispeech: A Large Scale Mandarin Speech Corpus., , , , , , , , , and 1 other author(s). ICASSP, page 6968-6972. IEEE, (2021)Research on Financial Performance Evaluation of Chinese Transportation Logistics Listed Companies., , and . IMMS, page 133-137. ACM, (2022)Mining Constrained Gradients in Large Databases., , , , , and . IEEE Trans. Knowl. Data Eng., 16 (8): 922-938 (2004)