Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sub-connection Based Isolation Against Network Virus., , , and . JDCTA, 3 (1): 110-122 (2009)PP-OCRv2: Bag of Tricks for Ultra Lightweight OCR System., , , , , , , , , and 2 other author(s). CoRR, (2021)Virus Detection Method based on Behavior Resource Tree., , , and . J. Inf. Process. Syst., 7 (1): 173-186 (2011)Design and Optimization of Resonance-Based Wireless Power Transmission for Millimeter-Sized Planar Square Inductors Micro-Magnetic Stimulation., , , , , and . IEEE Trans. Instrum. Meas., (2023)PP-ShiTu: A Practical Lightweight Image Recognition System., , , , , , , , , and 3 other author(s). CoRR, (2021)PP-LiteSeg: A Superior Real-Time Semantic Segmentation Model., , , , , , , , , and 6 other author(s). CoRR, (2022)A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus., , , , and . MASS, page 708-713. IEEE Computer Society, (2009)Enlister: baidu's recommender system for the biggest chinese Q&A website., , , and . RecSys, page 285-288. ACM, (2012)PP-YOLOv2: A Practical Object Detector., , , , , , , , , and 3 other author(s). CoRR, (2021)An Evaluating Model for Anti-virus Ability Based on AHP., , , and . CSE (1), page 394-398. IEEE Computer Society, (2009)