Author of the publication

Path Planning of Mobile Robots based on Improved Genetic Algorithm.

, , , and . RICAI, page 49-53. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modal Analysis of Quadrotor UAV Based on Free Disturbed Motion., , and . CAA SAFEPROCESS, page 1-5. IEEE, (2021)Self-Supervised Graph Neural Networks via Diverse and Interactive Message Passing., , , , , , , , and . AAAI, page 4327-4336. AAAI Press, (2022)Path Planning of Mobile Robots based on Improved Genetic Algorithm., , , and . RICAI, page 49-53. ACM, (2020)Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method., , , , , , and . EISA, volume 2004 of Communications in Computer and Information Science, page 20-37. Springer, (2023)HCL: Improving Graph Representation with Hierarchical Contrastive Learning., , , , , , , , and . ISWC, volume 13489 of Lecture Notes in Computer Science, page 108-124. Springer, (2022)Deep Neural Network Model over Encrypted Data., , , , , , and . EISA, volume 2004 of Communications in Computer and Information Science, page 107-117. Springer, (2023)Pulmonary nodule image super-resolution using multi-scale deep residual channel attention network with joint optimization., , , , , and . J. Supercomput., 76 (2): 1005-1019 (2020)Religious Beliefs and Cyber-Affairs., , and . PACIS, page 376. (2016)The Impact of Anti-phishing Laws on IT and Security Investment., , , and . PACIS, page 60. (2019)To alert or alleviate? A natural experiment on the effect of anti-phishing laws on corporate IT and security investments., , , and . Decis. Support Syst., (2024)