Author of the publication

Off-Policy Reinforcement Learning for Efficient and Effective GAN Architecture Search.

, , , , , , , and . ECCV (7), volume 12352 of Lecture Notes in Computer Science, page 175-192. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)The Influence of Different Personality Traits on Learning Achievement in Three Learning Situations., , , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 475-488. Springer, (2017)Adversarial Task-Specific Privacy Preservation under Attribute Attack., , , and . CoRR, (2019)Hardware/Software Security Patches for Internet of Trillions of Things., , , and . CoRR, (2019)UnLocIn: Unauthorized location inference on smartphones without being caught., , , , , , , and . PRISMS, page 1-8. IEEE, (2013)Using a coordination degree model to evaluate intensive urban land utilization., , , , , and . Geoinformatics, page 1-5. IEEE, (2010)A framework for distributed metadata management of mineral information resources with access control., , , and . Geoinformatics, page 1-4. IEEE, (2013)A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications., , and . Sensors, 18 (12): 4346 (2018)A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems., , , and . IEEE Access, (2017)An Exploratory Study of Functionality and Learning Resources of Web APIs on ProgrammableWeb., , and . EASE, page 202-207. ACM, (2017)