Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheme for implementing multitarget qubit controlled-NOT gate of photons and controlled-phase gate of electron spins via quantum dot-microcavity coupled system., , , , , and . Quantum Inf. Process., 15 (4): 1485-1498 (2016)A chemotaxis-enhanced bacterial foraging algorithm and its application in job shop scheduling problem., , , and . Int. J. Computer Integrated Manufacturing, 28 (10): 1106-1121 (2015)Kipnis-Shamir's Attack on HFE Revisited., , and . IACR Cryptology ePrint Archive, (2007)The small-world phenomenon of microblog communication networks in China: an empirical study based on complex network analysis., , and . ISSI, page 186-193. ISSI Society, (2017)Detumbling an uncontrolled satellite with contactless force by using an eddy current brake., , , , and . IROS, page 783-788. IEEE, (2013)Fast and Safe Exploration via Adaptive Semantic Perception in Outdoor Environments., , , , and . IROS, page 9445-9451. IEEE, (2022)A robust online subspace estimation and tracking algorithm., and . ICASSP, page 4065-4069. IEEE, (2015)A novel super-resolution CT image reconstruction via semi-supervised generative adversarial network., , , , and . Neural Comput. Appl., 32 (18): 14563-14578 (2020)Complexity of software trustworthiness and its dynamical statistical analysis methods., , , , , , and . Sci. China Ser. F Inf. Sci., 52 (9): 1651-1657 (2009)Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks., , , , , , , , and . Mach. Intell. Res., 20 (2): 180-193 (April 2023)