Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms with Logarithmic or Sublinear Regret for Constrained Contextual Bandits., , , and . NIPS, page 433-441. (2015)Online advertisements and multi-armed bandits. University of Illinois Urbana-Champaign, USA, (2015)PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication., , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 251-263. Springer, (2019)Message Passing Algorithm for the Generalized Assignment Problem., , , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 423-434. Springer, (2014)MSD-HAM-Net: A Multi-modality Fusion Network of PET/CT Images for the Prognosis of DLBCL Patients., , , , , , and . ICANN (8), volume 15023 of Lecture Notes in Computer Science, page 314-327. Springer, (2024)RRD-Bio: Building An Integrated Research Resource Database for Biomedicine., , , and . CoRR, (2024)LSC: Online auto-update smart contracts for fortifying blockchain-based log systems., , , , , and . Inf. Sci., (2020)Hybrid Attention Fusion Segmentation Network for Diffuse Large B-cell Lymphoma in PET-CT., , , , , and . WCSP, page 72-76. IEEE, (2022)Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones., , , , and . Comput. Electr. Eng., (2019)A Model-Based Systematic Innovative Design for Sonic Logging Instruments in Natural Gas Wells., , , and . Sensors, 24 (18): 6087 (September 2024)