Author of the publication

Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction.

, , , , , and . Int. J. Distributed Sens. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于Mozilla的安全性漏洞再修复经验研究 (Empirical Study of Reopened Security Bugs on Mozilla)., , , and . 计算机科学, 44 (11): 41-49 (2017)Simulation of Parallel Polarization Radiance for Retrieving Chlorophyll a Concentrations in Open Oceans Based on Spaceborne Polarization Crossfire Strategy., , , , , , , , , and . Remote. Sens., 15 (23): 5490 (December 2023)Intelligent analysis for software data: research and applications., , , and . Frontiers Inf. Technol. Electron. Eng., 23 (5): 661-663 (2022)A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application., , , , , and . Inf. Sci., (January 2024)MFCD-Net: Cross Attention Based Multimodal Fusion Network for DPC Imagery Cloud Detection., , , , , , , and . Remote. Sens., 14 (16): 3905 (2022)A comprehensive study on security bug characteristics., , , , , and . J. Softw. Evol. Process., (2021)Direct derivation scheme of DT-RNN algorithm for discrete time-variant matrix pseudo-inversion with application to robotic manipulator., , , , and . Appl. Soft Comput., (January 2023)Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray., , , , and . Comput. Electr. Eng., (2021)Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction., , , , , and . Int. J. Distributed Sens. Networks, (2017)Learning to Detect Memory-related Vulnerabilities., , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 43:1-43:35 (February 2024)