Author of the publication

Overall Loss for Deep Neural Networks.

, , and . PAKDD (Workshops), volume 11607 of Lecture Notes in Computer Science, page 223-231. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust rational route to randomness in a simple asset pricing model, , and . Journal of Economic Dynamics and Control, 29 (6): 1043--1072 (June 2005)Patch management automation for enterprise cloud., , , , , , , and . NOMS, page 691-705. IEEE, (2012)Multilayer Feed-forward Neural Network learning based Dynamic Chinese restaurant model for dynamic spectrum access in cognitive radio networks., , , , , and . ISCIT, page 173-176. IEEE, (2015)Cyclostationary feature based spectrum sensing via low-rank and sparse decomposition in cognitive radio networks., , , and . ISCIT, page 615-619. IEEE, (2016)Research on Self-Organizing Network Based on MIMO Technology., , , and . ICSON, volume 149 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-102. Springer, (2015)Research on Rate Control Combined with Joint Source-Channel Coding., , , and . ICSON, volume 149 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 137-145. Springer, (2015)A 1.2-GS/s 8-bit two-step SAR ADC in 65-nm CMOS with passive residue transfer., , and . A-SSCC, page 1-4. IEEE, (2015)Data configurations in railway signalling engineering - an application of enterprise systems techniques., , , , , and . Enterprise IS, 7 (3): 354-374 (2013)Authenticated Key Exchange Protocols with Enhanced Freshness Properties., and . IACR Cryptology ePrint Archive, (2009)Blake-Wilson, Johnson and Menezes Protocol Revisited., and . IACR Cryptology ePrint Archive, (2009)