Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control and Management of Optical Inter-Satellite Network based on CCSDS Protocol (Invited)., , , , , , , , , and . ECOC, page 1-3. IEEE, (2020)Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping., , , , , , , and . NeurIPS, (2020)Perfusion study on Modic changes of spine based on DCE-MRI., , , , , , and . BHI, page 365-367. IEEE, (2012)Availability-Aware Survivable Virtual Network Embedding in Optical Datacenter Networks., , , and . JOCN, 7 (12): 1160-1171 (2015)Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning., , , and . ISCC, page 1-6. IEEE, (2022)A Novel Electrode Design in DETF with Reducing Multimode Effect., , , , and . NEMS, page 1-5. IEEE, (2018)TIFE: Tree-Structured Interactive Feature Enhancement for Multivariate Time Series Forecasting., , and . ICIC (LNAI 6), volume 14880 of Lecture Notes in Computer Science, page 134-145. Springer, (2024)Assessing transferability of adversarial examples against malware detection classifiers., , and . CF, page 211-214. ACM, (2019)Finite-region boundedness and stabilization for 2D continuous-discrete systems in Roesser model., , , and . IMA J. Math. Control. Inf., 36 (3): 1033-1057 (2019)Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples., , , , , and . IEEE Access, (2019)