Author of the publication

Software development and design of network security system based on log data.

, , , and . J. Electronic Imaging, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Method for Detection of Missing Road Point Regions in Mobile Laser Scanning Data., , , , and . ISPRS Int. J. Geo Inf., 8 (12): 525 (2019)A Novel Stochastic Gradient Descent Algorithm Based on Grouping over Heterogeneous Cluster Systems for Distributed Deep Learning., , , , , , and . CCGRID, page 391-398. IEEE, (2019)POD: A Parallel Outlier Detection Algorithm Using Weighted kNN., and . IEEE Access, (2021)Automatic Framework for Detecting Obstacles Restricting 3D Highway Sight Distance Using Mobile Laser Scanning Data., , , and . J. Comput. Civ. Eng., (2021)Layup: Layer-adaptive and Multi-type Intermediate-oriented Memory Optimization for GPU-based CNNs., , , , , , , and . ACM Trans. Archit. Code Optim., 16 (4): 39:1-39:23 (2020)Graph autoencoder for directed weighted network., , , , , and . Soft Comput., 26 (3): 1217-1230 (2022)Coordinating Multi-Agent Deep Reinforcement Learning in Wargame., , , , and . ACAI, page 5:1-5:5. ACM, (2020)Machine compatible script for fast text entry of text using handwriting. Nanyang Technological University, Singapore, (2005)Segmentation and recognition of phonetic features in handwritten Pitman shorthand., , , and . Pattern Recognit., 41 (4): 1280-1294 (2008)Multi-Sensor Fusion Based Robot Self-Activity Recognition., , , and . Humanoids, page 1-9. IEEE, (2018)