Author of the publication

A Density-Peak-Based Clustering Method for Multiple Densities Dataset.

, , , , and . ISPRS Int. J. Geo Inf., 10 (9): 589 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion attack to a scalable AND-ACC fingerprinting scheme., and . VCIP, volume 6508 of SPIE Proceedings, page 65082X. SPIE, (2007)A Novel Separable Model and Decomposition Method for Sensor Locational Decision Problem., , , and . IJDSN, (2014)Blocking Foxy Phishing Emails with Historical Information., , , and . ICC, page 1-5. IEEE, (2010)An Attack on SMC-Based Software Protection., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 352-368. Springer, (2006)2FA Communication Protocol to Secure Metro Control Devices., , , , and . ITSC, page 1019-1024. IEEE, (2019)A Deep Learning Pipeline Parallel Optimization Method., , , , and . CCGrid, page 240-248. IEEE, (2023)A Memory Optimization Method for Distributed Training., , , , and . ICONIP (7), volume 1961 of Communications in Computer and Information Science, page 383-395. Springer, (2023)Identification of Faulty Links in LEO/MEO Satellite Communication Networks., , and . ICECCS, page 394-400. IEEE Computer Society, (2005)Data Quality-Oriented Data Integration in Peer-to-Peer System.. HIS (2), page 419-422. IEEE Computer Society, (2009)A Trust Answer to Distance Query., , and . WCNC, page 2703-2708. IEEE, (2007)