Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of Resilient Supply Network on Enterprise Development and Implementation Strategy., and . LISS (1), page 215-220. SciTePress, (2011)Token economy for online exchange systems., , and . AAMAS, page 1283-1284. IFAAMAS, (2012)Trend-Aware Video Caching Through Online Learning., , , and . IEEE Trans. Multim., 18 (12): 2503-2516 (2016)Multi-Level Metric Learning via Smoothed Wasserstein Distance., , , and . IJCAI, page 2919-2925. ijcai.org, (2018)Forecasting Popularity of Videos using Social Media., , , and . CoRR, (2014)Optimized Power Control for Over-the-Air Federated Edge Learning., , , and . CoRR, (2020)GATE: Graph CCA for Temporal Self-Supervised Learning for Label-Efficient fMRI Analysis., , , , and . IEEE Trans. Medical Imaging, 42 (2): 391-402 (February 2023)Local Smoothness Constrained Nonnegative Matrix Factorization with Nonlinear Convergence Rate for Spectral Decomposition., , , and . Int. J. Pattern Recognit. Artif. Intell., 31 (9): 1750030:1-1750030:13 (2017)Transparent Component Defect Detection Method Based on Improved YOLOv7 Algorithm., , , , and . Int. J. Pattern Recognit. Artif. Intell., 37 (14): 2350030:1-2350030:25 (November 2023)Hybrid intrusion detection model based on a designed autoencoder., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (8): 10799-10809 (2023)