Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CFBench: A Comprehensive Constraints-Following Benchmark for LLMs., , , , , , , , , and 3 other author(s). CoRR, (2024)Specification and verification of policy using RAISE and modelchecking., , , and . BMEI, page 2082-2086. IEEE, (2011)Unemployment duration and economic incentives--a quasi random-assignment approach, and . European Economic Review, 49 (7): 1799--1825 (October 2005)Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing., , , , and . IDCS, volume 8223 of Lecture Notes in Computer Science, page 238-251. Springer, (2013)Parallel Filter: A Visual Classifier Based on Parallel Coordinates and Multivariate Data Analysis., , , , , and . ICIC (2), volume 4682 of Lecture Notes in Computer Science, page 1172-1183. Springer, (2007)Developing Robot Reaching Skill with Relative-Location based Approximating., , , and . ICDL-EPIROB, page 147-154. IEEE, (2018)Improved CoarseAlignment for StrapdownInertial Navigation System Based on Recursive Quaternion Estimator Algorithm., , and . ICCMA, page 99-103. ACM, (2016)In-Motion Coarse Alignment Based on the Vector Observation for SINS., , , , and . IEEE Trans. Instrumentation and Measurement, 68 (10): 3740-3750 (2019)Steganalysis of LSB matching based on local variance histogram., , , and . ICIP, page 1005-1008. IEEE, (2010)Computer Vulnerability Evaluation Using Fault Tree Analysis., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 302-313. Springer, (2005)