Author of the publication

Research on cross-chain method based on distributed Digital Identity.

, , , and . ICBCT, page 59-73. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of the Compatibility of Laizhe with the MARVS Model of Event Types., and . CLSW, volume 11173 of Lecture Notes in Computer Science, page 321-333. Springer, (2018)PLOTS: Procedure Learning from Observations using subTask Structure., , and . AAMAS, page 1007-1015. International Foundation for Autonomous Agents and Multiagent Systems, (2019)LPIXray: A Large-scale Logistics Prohibited Item X-ray Dataset for the Application of Deep Learning in Security Inspection., , , and . CIPAE, page 481-485. IEEE, (2023)Constraint Sampling Reinforcement Learning: Incorporating Expertise for Faster Learning., , , and . AAAI, page 7841-7849. AAAI Press, (2022)Automatic Adaptive Sequencing in a Webgame., , , and . ITS, volume 12677 of Lecture Notes in Computer Science, page 430-438. Springer, (2021)Eye Movements During Dynamic Visual Search., , , , and . AHFE (17), volume 275 of Lecture Notes in Networks and Systems, page 1011-1017. Springer, (2021)Utilizing Multiple Regression Analysis and Entropy Method for Automated Aesthetic Evaluation of Interface Layouts., , , and . Symmetry, 16 (5): 523 (May 2024)Reinforcement-Learning-Assisted Multi-UAV Task Allocation and Path Planning for IIoT., , , , and . IEEE Internet Things J., 11 (16): 26766-26777 (August 2024)Output Tracking Predictive Control of Uncertain Networked Control Systems., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (6): 3141-3145 (June 2024)Factored DRO: Factored Distributionally Robust Policies for Contextual Bandits., , , and . NeurIPS, (2022)