Author of the publication

Hyper-Accelerated Learning for Brain-Computer Interfaces via Partial Target-Aware Optimal Transport.

, , and . SmartWear@MobiCom, page 21-27. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel parallel frequent itemset mining algorithm for automatic enterprise., , , , , and . Enterp. Inf. Syst., (October 2023)SweeTile: Efficient Tiling for 360° Video Streaming on Light-Weight VR Devices., and . ICC Workshops, page 1088-1093. IEEE, (2023)Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol., , , and . Int. J. Inf. Comput. Secur., 17 (1/2): 104-118 (2022)An RFID-Based Software Agent Framework on Pervasive Health Service., , , and . BMEI, page 1-4. IEEE, (2009)Maximum Likelihood Estimators for Three-Dimensional Rigid Body Localization in Internet of Things Environments., , , , and . IEEE Access, (2020)Using RFID technology to develop an intelligent equipment lock management system., , , and . Int. J. Comput. Sci. Eng., 20 (2): 157-165 (2019)Color disease spot image segmentation algorithm based on chaotic particle swarm optimization and FCM., , , , and . J. Supercomput., 76 (11): 8756-8770 (2020)Intelligent Agent-Based Predict System With Cloud Computing for Enterprise Service Platform in IoT Environment., , , and . IEEE Access, (2021)RFID-Based System on Emergency Medical Care., , , , , , and . PAAP, page 6-11. IEEE, (2018)Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing., , , , and . ICCE-TW, page 1-2. IEEE, (2019)