Author of the publication

Backward Mining Technology Research on Continuous Attacks in Wide Time Domain.

, , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1766-1770. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contour Transformer Network for One-Shot Segmentation of Anatomical Structures., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (10): 2672-2684 (2021)Unsupervised anomaly detection by densely contrastive learning for time series data., , , and . Neural Networks, (November 2023)Human thermal sensation algorithm modelization via physiological thermoregulatory responses based on dynamic thermal environment tests on males., , and . Comput. Methods Programs Biomed., (2022)Learning Bias-Invariant Representation by Cross-Sample Mutual Information Minimization., , , , and . ICCV, page 14982-14992. IEEE, (2021)Unsupervised Learning of Landmarks based on Inter-Intra Subject Consistencies., , , , and . CoRR, (2020)Feature Programming for Multivariate Time Series Prediction., , , , , and . CoRR, (2023)Power analysis attacks against FPGA implementation of KLEIN., , , , and . Secur. Commun. Networks, 9 (18): 5849-5857 (2016)Attentive Relational Networks for Mapping Images to Scene Graphs., , , , and . CoRR, (2018)Structured Landmark Detection via Topology-Adapting Deep Graph Learning., , , , , , , , , and 1 other author(s). ECCV (9), volume 12354 of Lecture Notes in Computer Science, page 266-283. Springer, (2020)Linear-nonlinear Learning Feedforward Control for PMSM Based on Deterministic Learning., , , and . ICIT, page 1-7. IEEE, (2022)