Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malware Based on Opcode N-Gram and Machine Learning., , and . 3PGCIC, volume 13 of Lecture Notes on Data Engineering and Communications Technologies, page 99-110. Springer, (2017)Sparse equalizer design under a quadratic constraint., , and . WCSP, page 1-5. IEEE, (2013)Stability Analysis for Primary Frequency Regulation from DFIG Tidal Turbines., , , and . ISGT Europe, page 1-6. IEEE, (2018)Car Pose in Context: Accurate Pose Estimation with Ground Plane Constraints., , , , and . CoRR, (2019)A Specific Iterative Closest Point Algorithm for Estimating Radar System Errors., , and . IEEE Access, (2020)基于多角度注意力机制的单一事实知识库问答方法 (Multi-view Attentional Approach to Single-fact Knowledge-based Question Answering)., , and . 计算机科学, 46 (10): 215-221 (2019)Measurement Uncertainty Assessment of Vertical Metal Tank Based on Grey System Theory., , , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 281-288. (2009)A New Hardware-in-the-Loop Traffic Signal Simulation Framework to Bridge Traffic Signal Research and Practice., and . IEEE Trans. Intell. Transp. Syst., 17 (9): 2430-2439 (2016)A Wireless Power Interface for Rechargeable Battery Operated Medical Implants., and . IEEE Trans. Circuits Syst. II Express Briefs, 54-II (10): 912-916 (2007)Research on the knowledge representation and retrieval for mechanical product design based on ontology., , , , , and . Int. J. Wirel. Mob. Comput., 16 (4): 340-349 (2019)