Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Matrix-in-matrix Neural Network for Image Super Resolution., , , , and . CoRR, (2019)SAR target configuration recognition based on the biologically inspired model., , , , and . Neurocomputing, (2017)Research of intrusion detection technology based on association rules.. ICDIP, volume 8878 of SPIE Proceedings, page 887839. SPIE, (2013)Research on mobile electronic commerce security technology based on WPKI.. ICDIP, volume 8878 of SPIE Proceedings, page 88780U. SPIE, (2013)Damage Analysis of 2008 Wenchuan Earthquake using SAR Images., , , , , , and . IGARSS (5), page 108-111. IEEE, (2009)Detecting bifurcation types in DC-DC switching converters by duplicate symbolic sequence., , , , and . ISCAS, page 2940-2943. IEEE, (2013)Energy finite element analysis of vibrating thin plates at high frequency., , , , and . CIS/RAM, page 255-259. IEEE, (2017)Improving Transfer Learning by Introspective Reasoner., , and . Intelligent Information Processing, volume 385 of IFIP Advances in Information and Communication Technology, page 28-39. Springer, (2012)Staffing Call Centers with Impatient Customers: Refinements to Many-Server Asymptotics., , and . Operations Research, 60 (2): 461-474 (2012)Simultaneous record detection and attribute labeling in web data extraction, , , and . ACM SIGKDD international conference on Knowledge discovery and data mining, (2006)