Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpreting vulnerabilities of multi-instance learning to adversarial perturbations., , , , , and . Pattern Recognit., (October 2023)An intelligent wireless channel allocation in HAPS 5G communication system based on reinforcement learning., , , , , , and . EURASIP J. Wirel. Commun. Netw., (2019)Deep adversarial autoencoder recommendation algorithm based on group influence., , , , and . Inf. Fusion, (December 2023)Optimization Deployment of Roadside Units with Mobile Vehicle Data Analytics., , , , and . APCC, page 358-363. IEEE, (2018)Open Continual Feature Selection via Granular-Ball Knowledge Transfer., , , , and . CoRR, (2024)Multi-beam coverage and beamforming technology for high altitude platform station communication system., , , , , , and . EURASIP J. Wirel. Commun. Netw., (2019)Towards Interpreting Vulnerability of Multi-Instance Learning via Customized and Universal Adversarial Perturbations., , , , and . CoRR, (2022)Kinoform Generated Combined with the Error Diffusion Method and the Dynamic Random Phase., , , , and . MLICOM, volume 342 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 271-277. Springer, (2020)Service Function Chain Deployment Using Deep Q Learning and Tidal Mechanism., , , and . IEEE Internet Things J., 11 (3): 5401-5416 (February 2024)Attention-Based Bidirectional Long Short-Term Memory Neural Network for Short Answer Scoring., , , , and . MLICOM, volume 342 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-112. Springer, (2020)