Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on analyzing encrypted network traffic of mobile devices., , , , , , and . Int. J. Inf. Sec., 21 (4): 873-915 (2022)Association Rule Mining Based HotSpot Analysis on SEER Lung Cancer Data., and . Int. J. Knowl. Discov. Bioinform., 2 (2): 34-54 (2011)Improving scalability of parallel CNN training by adaptively adjusting parameter update frequency., , , , , and . J. Parallel Distributed Comput., (2022)Uncertainty query sampling strategies for active learning of named entity recognition task., , and . Intell. Decis. Technol., 15 (1): 99-114 (2021)A Survey on Analyzing Encrypted Network Traffic of Mobile Devices., , , , , and . CoRR, (2020)Quantum Computing Enhanced Service Ecosystem for Simulation in Manufacturing., , , , , , , , , and 7 other author(s). CoRR, (2024)Building Halo Merger Trees from the Q Continuum Simulation., , , , , , and . CoRR, (2020)A General Framework Combining Generative Adversarial Networks and Mixture Density Networks for Inverse Modeling in Microstructural Materials Design., , , , , and . CoRR, (2021)Recognition of vocal emotions from acoustic profile., , and . ICACCI, page 710-716. ACM, (2012)Hazard analysis for human-on-the-loop interactions in sUAS systems., , , , and . ESEC/SIGSOFT FSE, page 8-19. ACM, (2021)