Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Adaptive LPCA Method for Fetal ECG Extraction Based on Multichannel Signals., , , and . IEEE Trans. Instrum. Meas., (2024)Epidemiological investigation of a COVID-19 family cluster outbreak transmitted by a 3-month-old infant., , , , , , , , , and 9 other author(s). Health Inf. Sci. Syst., 9 (1): 6 (2021)Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response., , , and . CoRR, (2017)SNDCNN: Self-normalizing deep CNNs with scaled exponential linear units for speech recognition., , , , , and . CoRR, (2019)SubCharacter Chinese-English Neural Machine Translation with Wubi encoding., , , , and . CoRR, (2019)Integrated Doppler Positioning in a Narrowband Satellite System: Performance Bound, Parameter Estimation, and Receiver Architecture., , , , , and . IEEE Internet Things J., 11 (6): 10893-10910 (March 2024)A Skewness-Aware Matrix Factorization Approach for Mesh-Structured Cloud Services., , , , , , and . IEEE/ACM Trans. Netw., 27 (4): 1598-1611 (2019)Hierarchical Bayesian combination of plug-in maximum a posteriori decoders in deep neural networks-based speech recognition and speaker adaptation., , and . Pattern Recognit. Lett., (2017)Automatic Recognition of Communication Signal Modulation Based on the Multiple-Parallel Complex Convolutional Neural Network., , , , and . Wirel. Commun. Mob. Comput., (2021)Mitigating Vulnerabilities in Closed Source Software., , and . EAI Endorsed Trans. Security Safety, 8 (30): 4 (2022)