Author of the publication

Unreadable Segment Recognition of Single-Lead ECG Signals Based on XGBoost: Fuision of Shannon Energy Envelope and Empirical Mode Decomposition.

, , , , , , and . MMBD/MLIS, volume 341 of Frontiers in Artificial Intelligence and Applications, page 688-694. IOS Press, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L2-L∞ consensus of stochastic delayed multi-agent systems with ADT switching interaction topologies., , , , , and . Appl. Math. Comput., (2020)Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning., , and . IEEE Trans. Inf. Forensics Secur., (2023)On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP., , , , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 34-49. Springer, (2014)Approximate-Deterministic Public Key Encryption from Hard Learning Problems., , , , and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 25-42. (2016)Resilient fault-tolerant anti-synchronization for stochastic delayed reaction-diffusion neural networks with semi-Markov jump parameters., , , , and . Neural Networks, (2020)A New Structured Domain Adversarial Neural Network for Transfer Fault Diagnosis of Rolling Bearings Under Different Working Conditions., , , , and . IEEE Trans. Instrum. Meas., (2021)(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus., , , , , and . AsiaCCS, page 907-912. ACM, (2016)Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 105-116. Springer, (2013)Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation., , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 162-177. Springer, (2014)Lossy Key Encapsulation Mechanism and Its Applications., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 126-144. (2016)