Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamical model for individual defence against cyber epidemic attacks., , , and . IET Inf. Secur., 13 (6): 541-551 (2019)6G Network Business Support System., , , , , , , , , and . CoRR, (2023)AIGC Empowering Telecom Sector White Paper_chinese., , , , , , , and . CoRR, (2023)6G Network Operation Support System., , , , , , , , , and . CoRR, (2023)Research on Model and Simulation of Vehicle Network Based on LTE Technology., , , , , and . BMSB, page 1-7. IEEE, (2023)AdaptiveNet: Post-deployment Neural Architecture Adaptation for Diverse Edge Environments., , , , , , , and . MobiCom, page 28:1-28:17. ACM, (2023)Using intelligent ontology technology to extract knowledge from successful project in IoT enterprise systems., , , and . Enterp. Inf. Syst., (2022)Boosting ship detection in SAR images with complementary pretraining techniques., , , , , and . CoRR, (2021)The QXS-SAROPT Dataset for Deep Learning in SAR-Optical Data Fusion., , , , , , , , and . CoRR, (2021)Empowering LLM to use Smartphone for Intelligent Task Automation., , , , , , , , , and . CoRR, (2023)