Author of the publication

Deformed semicircle law and concentration of nonlinear random matrices for ultra-wide neural networks.

, and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group risk assessment in failure mode and effects analysis using a hybrid probabilistic hesitant fuzzy linguistic MCDM method., , , , and . Expert Syst. Appl., (2022)Processing Point Clouds Using Simulated Physical Processes as Replacements of Conventional Mathematically Based Procedures: A Theoretical Virtual Measurement for Stem Volume., , , , and . Remote. Sens., 13 (22): 4627 (2021)Design of a Generic Virtual Measurement Workflow for Processing Archived Point Cloud of Trees and Its Implementation of Light Condition Measurements on Stems., , , , , and . Remote. Sens., 13 (14): 2801 (2021)Sequential Distributed Model Predictive Control for Automated Mining Fleet., and . IEEE Access, (2023)Recurrent convolutional networks based intention recognition for human-robot collaboration tasks., , , and . SMC, page 1675-1680. IEEE, (2017)Failure mode and effects analysis using extended matter-element model and AHP., , , , and . Comput. Ind. Eng., (2020)Expressive-VC: Highly Expressive Voice Conversion with Attention Fusion of Bottleneck and Perturbation Features., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)One-Shot Voice Conversion For Style Transfer Based On Speaker Adaptation., , , , , , and . ICASSP, page 6792-6796. IEEE, (2022)Sigma Protocols from Verifiable Secret Sharing and Their Applications., , , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 208-242. Springer, (2023)SeWG: Security-enhanced WireGuard for Android Based on TEE., , , , , and . TrustCom, page 1711-1717. IEEE, (2020)