Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlling the Risk of Conversational Search via Reinforcement Learning., and . WWW, page 1968-1977. ACM / IW3C2, (2021)Local Linear Embedding Algorithm with Adaptively Determining Neighborhood., , , and . J. Networks, 9 (6): 1550-1557 (2014)BER Performance Analysis for Universal Filtered Multicarrier System with WFRFT precoding., , and . ICCC, page 470-474. IEEE, (2018)A Red Team automated testing modeling and online planning method for post-penetration., , , , and . Comput. Secur., (2024)Contrastive voxel clustering for multiscale modeling of brain network., , , , , , , , , and . NeuroImage, (2024)On the Performance of Nonlinear Corrective Active Constellation Expansion in OTFS Systems., , , and . IEEE Commun. Lett., 26 (6): 1418-1422 (2022)BER Analysis for GFDM Systems With Gabor MMSE Receiver., , and . IEEE Commun. Lett., 22 (11): 2222-2225 (2018)Low Complexity MMSE-SIC Receiver for OTFS in High-Speed Mobile Scenarios., , , , and . IEEE Commun. Lett., 28 (3): 667-671 (March 2024)Research on the Privacy Security and Defense Strategies on the Internet of Things Platform., , , and . CSIA, volume 928 of Advances in Intelligent Systems and Computing, page 218-223. Springer, (2019)A network location method considering sound ray bending., and . ICSPCC, page 1-4. IEEE, (2022)