Author of the publication

The Application of Intelligent Computing and Machine Learning in the Security Guarantee and Information Security Scheme Design.

, , , , and . ICMLCA, page 396-400. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 24 W Ku band GaN based power amplifier with 9.1 dB linear gain., , , , and . Microelectron. J., 43 (8): 569-572 (2012)Application of Image Segmentation on Evaluating Infarct Core in Acute Ischemic Stroke Using CT Perfusion., , , , , , , , , and . ISICDM, page 138-142. ACM, (2018)A coordinate descent algorithm for sparse positive definite matrix estimation., and . Stat. Anal. Data Min., 6 (5): 431-442 (2013)Three-dimensional pose detection method based on keypoints detection network for tomato bunch., , , , , and . Comput. Electron. Agric., (2022)Enriching one-class collaborative filtering with content information from social media., , , , and . Multim. Syst., 22 (1): 51-62 (2016)Personalized Recommendation Meets Your Next Favorite., , , and . CIKM, page 1775-1778. ACM, (2015)Mapping Forested Floodplain Topography Using InSAR and Radar Altimetry., , , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (12): 5189-5198 (2019)A Multiple IMM Estimation Approach with Unbiased Mixing for Thrusting Projectiles., , , , , and . IEEE Trans. Aerosp. Electron. Syst., 48 (4): 3250-3267 (2012)GDOP and the CRB for Positioning Systems., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (2): 733-737 (2017)"Build It and They Will Come?" A Case Study of the Use of a Wiki in a Higher Education Research Unit., , , , and . iJAC, 3 (3): 39-44 (2010)