Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extrinsic calibration of a laser range finder and a camera based on the automatic detection of line feature., , , and . CISP-BMEI, page 448-453. IEEE, (2016)LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform., , , and . ICCCN, page 1-5. IEEE, (2011)Web service QoS prediction: when collaborative filtering meets data fluctuating in big-range., , , , and . World Wide Web, 23 (3): 1715-1740 (2020)Non-negative Tucker decomposition with graph regularization and smooth constraint for clustering., , and . Pattern Recognit., (April 2024)TruCom: Exploiting Domain-Specific Trust Networks for Multicategory Item Recommendation., , , , , and . IEEE Syst. J., 11 (1): 295-304 (2017)Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image., , , , , , and . Appl. Intell., 53 (1): 683-705 (2023)The Capacity of Private Information Retrieval with Private Side Information., , and . CoRR, (2017)Flexible Constructions for Distributed Matrix Multiplication., , , , and . ISIT, page 1576-1581. IEEE, (2021)Timing-Driven X-architecture Steiner Minimum Tree Construction Based on Social Learning Multi-Objective Particle Swarm Optimization., , , , and . WWW (Companion Volume), page 77-84. ACM / IW3C2, (2021)Limited-Magnitude Error Correction for Probability Vectors in DNA Storage., , and . ICC, page 3460-3465. IEEE, (2022)