Author of the publication

Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System.

, , , , , and . Wirel. Commun. Mob. Comput., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on the Innovative Education Practical Teaching Mode of Electronic Information for Outstanding Engineer., , , , , and . eLEOT, volume 243 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 73-78. Springer, (2018)Adversarial Metric Attack for Person Re-identification., , , , and . CoRR, (2019)Learning Transferable Adversarial Examples via Ghost Networks., , , , , and . CoRR, (2018)AtomNAS: Fine-Grained End-to-End Neural Architecture Search., , , , , , and . CoRR, (2019)Modeling and optimal design of fiber-optic probe for medium detection based on computer simulation., , , , , and . Clust. Comput., 22 (5): 11207-11226 (2019)Adversarial Attacks on Monocular Depth Estimation., , , , and . CoRR, (2020)CAKES: Channel-wise Automatic KErnel Shrinking for Efficient 3D Network., , , , and . CoRR, (2020)Question Classification Based on Incremental Modified Bayes., , , , and . FGCN (2), page 149-152. IEEE Computer Society, (2008)978-0-7695-3431-2.Neural Architecture Search for Lightweight Non-Local Networks., , , , , , , , , and . CVPR, page 10294-10303. Computer Vision Foundation / IEEE, (2020)MoDAR: Using Motion Forecasting for 3D Object Detection in Point Cloud Sequences., , , , and . CVPR, page 9329-9339. IEEE, (2023)