Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAR Target Recognition Based on Inception and Fully Convolutional Neural Network Combining Amplitude Domain Multiplicative Filtering Method., , and . Remote. Sens., 14 (22): 5718 (2022)The Short-Term Repeatability of Subdermal Electrical Stimulation for Sensory Feedback., , , , and . IEEE Access, (2020)Multi-model induced network for participatory-sensing-based classification tasks in intelligent and connected transportation systems., , , , , , and . Comput. Networks, (2018)CNN: Single-label to Multi-label., , , , , , and . CoRR, (2014)A Spatio-Temporal Flow Model of Dockless Shared Bikes., , , and . DSC, page 312-317. IEEE, (2019)An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks., , , and . Sensors, 14 (9): 16617-16629 (2014)RMLIM: A Runtime Machine Learning Based Identification Model for Approximate Computing on Data Flow Graphs., , , , and . IEEE Trans. Sustain. Comput., 7 (1): 201-210 (2022)The Design and Application of "Cloud - Edge -End" Integrated Computation in the Higher Education Teaching Informatization Construction., , and . ICMSS, page 87-90. ACM, (2020)A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysis., , , , , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 64-76. Springer, (2021)Is It Approximate Computing or Malicious Computing?, , , , and . ACM Great Lakes Symposium on VLSI, page 333-338. ACM, (2020)