Author of the publication

SARS-CoV-2 becoming more infectious as revealed by algebraic topology and deep learning.

, , and . Commun. Inf. Syst., 21 (1): 31-36 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convolutional neural network using multi-scale information for stereo matching cost computation., and . ICIP, page 3424-3428. IEEE, (2016)MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature., , , and . IACR Cryptol. ePrint Arch., (2013)A New Classification Method of Signature Network Node Based on Potential Space Projection., , , and . ICDM Workshops, page 628-633. IEEE, (2019)Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing., , , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 169-180. Springer, (2018)Research and Realization of the Background of Freelancer System., , , , and . Int. J. Adv. Pervasive Ubiquitous Comput., 8 (4): 1-20 (2016)Ultrawideband Tomographic Imaging in Multipath-Rich Environment., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Knowledge Graph Representation Learning-Based Forest Fire Prediction., , , , and . Remote. Sens., 14 (17): 4391 (2022)Rapid and Non-Destructive Detection of Compression Damage of Yellow Peach Using an Electronic Nose and Chemometrics., , , , , , , , and . Sensors, 20 (7): 1866 (2020)Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges., , , and . IEEE Netw., 36 (5): 98-105 (2022)A Jumping Mining Attack and Solution., , , and . CoRR, (2020)