Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Calculation of Bounds for Greedy Algorithms when Applied to Sensor Selection Problems.. CoRR, (2017)Risk Analysis of Aedes triseriatus in China., , , , and . CCTA (2), volume 345 of IFIP Advances in Information and Communication Technology, page 465-472. Springer, (2010)Single-View 3D Human Digitalization with Large Reconstruction Models., , , , , , and . CoRR, (2024)A Novel Distributed and Stealthy Attack on Active Distribution Networks and a Mitigation Strategy., , and . IEEE Trans. Ind. Informatics, 16 (2): 823-831 (2020)Addressing the train-test gap on traffic classification combined subflow model with ensemble learning., , , , , , and . Knowl. Based Syst., (2020)Variable selection for partially linear models via partial correlation., , and . J. Multivar. Anal., (2018)Incentive Mechanism Design For Federated Learning in Multi-access Edge Computing., , , and . GLOBECOM, page 3454-3459. IEEE, (2022)Test for conditional independence with application to conditional screening., , and . J. Multivar. Anal., (2020)Citation counts prediction of statistical publications based on multi-layer academic networks via neural network model., , , and . Expert Syst. Appl., 238 (Part C): 121634 (March 2024)Monitoring Technology of Energy Storage Power Stations based on Discharge Control Scheduling Algorithm., , , , and . Int. J. Perform. Eng., 17 (1): 95-102 (2021)