Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thermally Stable All‐Polymer Solar Cells with High Tolerance on Blend Ratios, , , , , , , , , and . Advanced Energy Materials, (June 2018)A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1168-1174. Springer, (2005)Dual-branch counting method for dense crowd based on self-attention mechanism., , and . Expert Syst. Appl., (February 2024)Intelligent Penetration Testing in Dynamic Defense Environment., , , and . CSW, page 10-15. ACM, (2022)IKN-CF: An Approach to Identify Key Nodes in Inter-Domain Routing Systems Based on Cascading Failures., , , and . Entropy, 23 (11): 1456 (2021)Cheat-FlipIt: An Approach to Modeling and Perception of a Deceptive Opponent., , and . SETTA, volume 14464 of Lecture Notes in Computer Science, page 368-384. Springer, (2023)DualCF: Efficient Model Extraction Attack from Counterfactual Explanations., , and . FAccT, page 1318-1329. ACM, (2022)A new GSC beamforming algorithm based on double affine projection., , , , and . BMSB, page 1-4. IEEE, (2014)The impact of intelligent transportation points system based on Elo rating on emergence of cooperation at Y intersection., , , , and . Appl. Math. Comput., (2020)Prufer Coding: A Vectorization Method for Undirected Labeled Graph., and . IEEE Access, (2020)