From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis., , , и . WCNC, стр. 1-6. IEEE, (2017)A Scale Balanced Loss for Bounding Box Regression., , , , , , , и . IEEE Access, (2020)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data., , , , и . ICBDC, стр. 151-155. ACM, (2019)On Eliminating Blocking Interference of RFID Unauthorized Reader Detection., , , и . WASA (1), том 13471 из Lecture Notes in Computer Science, стр. 591-602. Springer, (2022)Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition., , , , , , и . ICME, стр. 1-6. IEEE, (2022)CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion., , и . ICT, стр. 1-5. IEEE, (2021)ITAR: A Method for Indoor RFID Trajectory Automatic Recovery., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 400-418. Springer, (2022)ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis., , , , , и . ICONIP (4), том 14450 из Lecture Notes in Computer Science, стр. 200-212. Springer, (2023)Group Verification Based Multiple-Differential Collision Attack., , , , и . ICICS, том 9977 из Lecture Notes in Computer Science, стр. 145-156. Springer, (2016)