Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The adaptive composite trapezoidal rule for Hadamard finite-part integrals on an interval., , and . J. Comput. Appl. Math., (2017)Multi-scale semantic deep fusion models for phishing website detection., , and . Expert Syst. Appl., (2022)Nonconforming FEMs for an Optimal Design Problem., and . SIAM J. Numer. Anal., 53 (2): 874-894 (2015)Full-spectrum cell-free RAN for 6G systems: system design and experimental results., , , , , , , , , and 8 other author(s). Sci. China Inf. Sci., (March 2023)A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites., and . J. Netw. Syst. Manag., 32 (1): 8 (March 2024)Novel empty train return strategy and passenger control strategy to satisfy asymmetric passenger demand: A joint optimization with train timetabling., , , , , , and . Comput. Ind. Eng., (July 2023)Toward 6G $TK\mu$ Extreme Connectivity: Architecture, Key Technologies and Experiments., , , , , , , , , and 15 other author(s). IEEE Wirel. Commun., 30 (3): 86-95 (June 2023)Stabilized FEM for Some Optimal Design Problem., , , and . J. Sci. Comput., 73 (1): 228-241 (2017)Service Delay Minimization for Federated Learning over Mobile Devices., , , , , and . CoRR, (2022)The superconvergence of the Newton-Cotes rule for Cauchy principal value integrals., , and . J. Comput. Appl. Math., 235 (3): 696-707 (2010)