Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Adherence to Cognitive Behavioral Therapy for Insomnia through Machine and Social Persuasion., , , , , , , , , and 3 other author(s). GreenCom/iThings/CPScom, page 750-757. IEEE, (2013)A Novel Postprocessing Method for Robust Myoelectric Pattern-Recognition Control Through Movement Pattern Transition Detection., , , , and . IEEE Trans. Hum. Mach. Syst., 50 (1): 32-41 (2020)Can Higher-Order Mutants Improve the Performance of Mutation-Based Fault Localization?, , , , , , and . IEEE Trans. Reliab., 71 (2): 1157-1173 (2022)A Framework for Daily Activity Monitoring and Fall Detection Based on Surface Electromyography and Accelerometer Signals., , and . IEEE J. Biomed. Health Informatics, 17 (1): 38-45 (2013)Motion Recognition Algorithm Based on Deep Edge-Aware Pyramid Pooling Network in Human-Computer Interaction., , , and . IEEE Access, (2019)A Reduced-Complexity ADMM Based Decoding Algorithm for LDPC Codes., , , and . WCSP, page 1-6. IEEE, (2019)Interpretation of Protein Subcellular Location Patterns in 3D Images Across Cell Types and Resolutions., and . BIRD, volume 4414 of Lecture Notes in Computer Science, page 328-342. Springer, (2007)GNet4FL: effective fault localization via graph convolutional neural network., , and . Autom. Softw. Eng., 30 (2): 16 (November 2023)A hierarchical estimation scheme of tire-force based on random-walk SCKF for vehicle dynamics control., , , , , and . J. Frankl. Inst., 357 (18): 13964-13985 (2020)A security integration model for private data of intelligent mobile communication based on edge computing.. Comput. Commun., (2020)