Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Security Situation Assessment Method Based on Markov Game Model., , , and . KSII Trans. Internet Inf. Syst., 12 (5): 2414-2428 (2018)Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence., , , , , and . IEEE Trans. Ind. Informatics, 16 (10): 6532-6542 (2020)Are Large Language Models Rational Investors?, , , , , , and . CoRR, (2024)A fast and memory efficient MLCS algorithm by character merging for DNA sequences alignment., , , and . Bioinform., 36 (4): 1066-1073 (2020)Region Normalization for Image Inpainting., , , , , , , and . CoRR, (2019)DSE-TTS: Dual Speaker Embedding for Cross-Lingual Text-to-Speech., , , , and . CoRR, (2023)Achieving Fast Convergence and High Efficiency using Differential Explicit Feedback in Data Center., , , , , and . IEEE Trans. Cloud Comput., 11 (3): 2312-2324 (July 2023)Using deep reinforcement learning to speed up collective cell migration., , , , , , and . BMC Bioinform., 20-S (18): 571:1-571:10 (2019)Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems., , , , and . IEEE Trans. Veh. Technol., 68 (4): 3854-3865 (2019)Decision making for the selection of cloud vendor: An improved approach under group decision-making with integrated weights and objective/subjective attributes., , and . Expert Syst. Appl., (2016)