Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Word Features for Keyword Extraction., , , and . WAIM, volume 9098 of Lecture Notes in Computer Science, page 148-160. Springer, (2015)Data Mining Service Based on MDA., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 297-302. Springer, (2004)From IFC to 3D Tiles: An Integrated Open-Source Solution for Visualising BIMs on Cesium., , , and . ISPRS Int. J. Geo Inf., 7 (10): 393 (2018)DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm., , , and . Security and Management, page 251-257. CSREA Press, (2008)Convertible identity-based anonymous designated ring signatures., , and . Int. J. Secur. Networks, 1 (3/4): 218-225 (2006)Representation and Reasoning of Fuzzy Knowledge Under Variable Fuzzy Criterion Using Extended Fuzzy Petri Nets., , , , and . IEEE Trans. Fuzzy Syst., 28 (12): 3376-3390 (2020)DATE: Dual Assignment for End-to-End Fully Convolutional Object Detection., , , and . CoRR, (2022)Multi-Agent Hyper-Attention Policy Optimization., , , , , , and . ICONIP (1), volume 13623 of Lecture Notes in Computer Science, page 76-87. Springer, (2022)Analyzing and Improving Customer-Side Cloud Security Certifiability., , , and . ISSRE Workshops, page 300-307. IEEE, (2019)Sense Rank AALesk: A Semantic Solution for Word Sense Disambiguation., and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 710-717. Springer, (2005)