Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the Travel Mode Choice for Outpatient Trips Before and After Bike-Sharing in Beijing., , , , , and . ITSC, page 242-247. IEEE, (2018)DOBC Based Fully Probability Design for Stochastic System With the Multiplicative Noise., and . IEEE Access, (2020)GIS-Based Commute Analysis Using Smart Card Data: A Case Study of Multi-Mode Public Transport for Smart City., , , , and . GRMSE, volume 569 of Communications in Computer and Information Science, page 83-94. Springer, (2015)Cryptographic Reverse Firewalls for Identity-Based Encryption., , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 36-52. Springer, (2019)Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks., and . FCS, volume 879 of Communications in Computer and Information Science, page 190-198. Springer, (2018)Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph., , , and . CSSE, page 1-9. ACM, (2020)A Fitness Landscape Analysis of the LeNet-5 Loss Function., and . SSCI, page 352-359. IEEE, (2022)SaProt: Protein Language Modeling with Structure-aware Vocabulary., , , , , and . ICLR, OpenReview.net, (2024)MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks., , , and . CoRR, (2023)Fully Probabilistic Design for Stochastic Discrete System with Multiplicative Noise., , and . ICCA, page 940-945. IEEE, (2019)