Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Adversarial Neural Network Encryption Algorithm Against the Chosen-Cipher Text Attack (CCA)., , , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 1336-1343. Springer, (2019)A Forensic Aspect of Articulation Rate Variation in Chinese., and . ICPhS, page 396-399. (2011)Speech Synthesis Method Based on Tacotron + WaveNet., , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 662-670. Springer, (2019)A coordinate measuring machine with parallel mechanisms., and . ICRA, page 3256-3261. IEEE, (1997)An Enhanced Hidden Markov Map Matching Model for Floating Car Data., , , and . Sensors, 18 (6): 1758 (2018)Deconstructing Information Sharing., and . J. AIS, 20 (4): 1 (2019)Enabling Smart Logistics for Service Operations., , and . Transforming Field and Service Operations, Springer, (2013)Implementation of Audio Data Packet Encryption Synchronization Circuit., , and . ECC (2), volume 298 of Advances in Intelligent Systems and Computing, page 321-329. Springer, (2014)Sub-pattern analysis of Chinese guarantee network., , , and . CoRR, (2018)Correlations between body heights and formant frequencies in young male speakers: a pilot study., , and . ISCSLP, page 536-540. IEEE, (2014)