Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction Safety Monitoring System Based on UAV Image., , , and . ADHIP (2), volume 469 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 546-556. Springer, (2022)Prediction Method of Crack Depth of Concrete Building Components Based on Ultrasonic Signal., , , and . ADHIP (1), volume 468 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 634-647. Springer, (2022)Dynamic Risk Measure for China's Short-Term International Capital Flows., and . MMBD, volume 370 of Frontiers in Artificial Intelligence and Applications, page 132-141. IOS Press, (2023)Post-fabrication reconfiguration for power-optimized tuning of optically connected multi-core systems., , , , , and . ASP-DAC, page 615-620. IEEE, (2012)Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control., , and . HPCC/EUC, page 935-942. IEEE, (2013)Quantized Wasserstein Procrustes Alignment of Word Embedding Spaces., , , , , , , , and . AMTA, page 200-214. Association for Machine Translation in the Americas, (2022)Verifiable Edge Computing for Indoor Positioning., and . ICC, page 1-6. IEEE, (2020)B4SDC: A Blockchain System for Security Data Collection in MANETs., , and . ICC, page 1-6. IEEE, (2020)Game Theoretical Study on a Client-Controlled Deduplication Scheme., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1154-1161. IEEE, (2019)Theoretical Issues in the Study of Trust in Human-Computer Interaction., , and . TrustCom, page 853-856. IEEE Computer Society, (2011)