Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and experiments of network attack defence system., , and . SMC (4), page 3548-3553. IEEE, (2004)Ship Motion Attitude Prediction Based on an Adaptive Dynamic Particle Swarm Optimization Algorithm and Bidirectional LSTM Neural Network., , and . IEEE Access, (2020)Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting., , , and . IEEE Access, (2020)Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT., , , and . Frontiers Comput. Sci., 18 (3): 183817 (June 2024)Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux., , and . IMSCCS (2), page 771-775. IEEE Computer Society, (2006)0-7695-2581-4.Uncorrelated Discriminant Locality Aware Embedding for Face Recognition., , and . CSIE (4), page 178-181. IEEE Computer Society, (2009)Research on Optimization Method of Visual Odometer Based on Point Line Feature Fusion., , and . HP3C, page 274-280. ACM, (2023)Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm., , and . Clust. Comput., 22 (Supplement): 2629-2637 (2019)Pareto-Q Learning Algorithm for Cooperative Agents in General-Sum Games., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 576-578. Springer, (2005)基于SVM的主题爬虫技术研究 (Research on Focused Crawling Technology Based on SVM)., , and . 计算机科学, 42 (2): 118-122 (2015)