From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An intrusion detection algorithm for wireless networks based on ASDL., , и . IEEE CAA J. Autom. Sinica, 5 (1): 92-107 (2018)Model Checking Computational Tree Logic Using Sticker Automata., , , и . BIC-TA (1), том 681 из Communications in Computer and Information Science, стр. 12-20. Springer, (2016)LPN: Label-Enhanced Prototypical Network for Legal Judgment Prediction., , , , и . Entropy, 25 (10): 1398 (октября 2023)基于时序逻辑的3种网络攻击建模 (Modeling for Three Kinds of Network Attacks Based on Temporal Logic)., , , и . 计算机科学, 45 (2): 209-214 (2018)Design And Implementation of Video Learning Platform Based on B / S Architecture., , и . CSSE, стр. 274-278. ACM, (2021)Model Checking for Computation Tree Logic with Past Based on DNA Computing., , , , , и . BIC-TA, том 791 из Communications in Computer and Information Science, стр. 131-147. Springer, (2017)Time Interest Network for Click-Through Rate Prediction., , , и . EITCE, стр. 1159-1165. ACM, (2022)Adversarial Transfer for Classical Chinese NER with Translation Word Segmentation., , , , и . NLPCC (1), том 13551 из Lecture Notes in Computer Science, стр. 298-310. Springer, (2022)Mimic automata: A novel formal model for mimic computing., , , , и . Cogn. Syst. Res., (2019)Robustness evaluation for deep neural networks via mutation decision boundaries analysis., , , и . Inf. Sci., (2022)