Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)Multi-Class Classification from Noisy-Similarity-Labeled Data., , , , , , , and . CoRR, (2020)Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend., , , , , and . CoRR, (2023)Energy-efficient opportunistic localization with indoor wireless sensor networks., , , , and . Comput. Sci. Inf. Syst., 8 (4): 973-990 (2011)Transport Properties of Liquid Aluminum at High Pressure from Quantum Molecular Dynamics Simulations., and . ICCSA (6), volume 10409 of Lecture Notes in Computer Science, page 787-795. Springer, (2017)基于决策树的被动操作系统识别技术研究 (Research of Passive OS Recognition Based on Decision Tree)., , and . 计算机科学, 43 (8): 79-83 (2016)Distance and similarity measures for dual hesitant fuzzy sets and their applications in pattern recognition., , , and . J. Intell. Fuzzy Syst., 29 (2): 731-745 (2015)PixelLink: Detecting Scene Text via Instance Segmentation., , , and . AAAI, page 6773-6780. AAAI Press, (2018)Lidar Point Cloud Guided Monocular 3D Object Detection., , , , , , , and . ECCV (1), volume 13661 of Lecture Notes in Computer Science, page 123-139. Springer, (2022)Convolutional Embedding Makes Hierarchical Vision Transformer Stronger., , , , , and . ECCV (20), volume 13680 of Lecture Notes in Computer Science, page 739-756. Springer, (2022)