From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on Information Security of College Ideology., и . ICIC (1), том 9771 из Lecture Notes in Computer Science, стр. 571-579. Springer, (2016)SGDAT: An optimization method for binary neural networks., , , и . Neurocomputing, (октября 2023)Latent Fingerprint Registration via Matching Densely Sampled Points., , , и . IEEE Trans. Inf. Forensics Secur., (2021)Latent Fingerprint Registration via Matching Densely Sampled Points., , , и . CoRR, (2020)Efficient Rectification of Distorted Fingerprints., , , и . IEEE Trans. Inf. Forensics Secur., 13 (1): 156-169 (2018)Latent Fingerprint Indexing: Robust Representation and Adaptive Candidate List., , , и . IEEE Trans. Inf. Forensics Secur., (2022)A Personalized Automated Bidding Framework for Fairness-aware Online Advertising., , , , , , , , , и . KDD, стр. 5544-5553. ACM, (2023)Non-Scan Design for Testability Based on Fault Oriented Conflict Analysis., , и . Asian Test Symposium, стр. 86-. IEEE Computer Society, (2002)A cost-effective scan architecture for scan testing with non-scan test power and test application cost., , , и . DAC, стр. 744-747. ACM, (2003)Non-Scan Design for Testability for Mixed RTL Circuits with Both Data Paths and Controller via Conflict Analysis., , и . Asian Test Symposium, стр. 300-305. IEEE Computer Society, (2003)