Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAR Target Recognition Based on Inception and Fully Convolutional Neural Network Combining Amplitude Domain Multiplicative Filtering Method., , and . Remote. Sens., 14 (22): 5718 (2022)CNN: Single-label to Multi-label., , , , , , and . CoRR, (2014)Multi-model induced network for participatory-sensing-based classification tasks in intelligent and connected transportation systems., , , , , , and . Comput. Networks, (2018)The Short-Term Repeatability of Subdermal Electrical Stimulation for Sensory Feedback., , , , and . IEEE Access, (2020)RMLIM: A Runtime Machine Learning Based Identification Model for Approximate Computing on Data Flow Graphs., , , , and . IEEE Trans. Sustain. Comput., 7 (1): 201-210 (2022)An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks., , , and . Sensors, 14 (9): 16617-16629 (2014)A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysis., , , , , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 64-76. Springer, (2021)The Design and Application of "Cloud - Edge -End" Integrated Computation in the Higher Education Teaching Informatization Construction., , and . ICMSS, page 87-90. ACM, (2020)Deep domain adaptation for describing people based on fine-grained clothing attributes., , , , , and . CVPR, page 5315-5324. IEEE Computer Society, (2015)Is It Approximate Computing or Malicious Computing?, , , , and . ACM Great Lakes Symposium on VLSI, page 333-338. ACM, (2020)