Author of the publication

Automatic Identification and Intelligent Optimization of Tunnel-Free Curve Reconfiguration.

, , , , , and . Symmetry, 14 (12): 2505 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cell and user virtualization for ultra dense network., , , , and . PIMRC, page 2359-2363. IEEE, (2015)Network Anomalous Attack Detection Based on Clustering and Classifier., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 672-682. Springer, (2006)Detecting Novel Network Attacks with a Data Field., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 66-72. Springer, (2006)Optimizing Caching Policy for Loss Recovery in Reliable Multicast., , and . INFOCOM, IEEE, (2006)Adaptive subcarrier-distribution algorithm for routing and spectrum allocation in OFDM-based elastic optical networks., , , and . Photonic Netw. Commun., 28 (3): 225-231 (2014)Mining hidden non-redundant causal relationships in online social networks., , , , and . Neural Comput. Appl., 32 (11): 6913-6923 (2020)Hybrid network of convolutional neural network and transformer for deepfake geographic image detection., , , , , and . J. Electronic Imaging, (2024)Stabilization of Nonholonomic Robot Formations: A First-state Contractive Model Predictive Control Approach., and . J. Comput. Inf. Technol., 17 (1): 37-50 (2009)A Note on Lower Bounds for Colourful Simplicial Depth., , and . Symmetry, 5 (1): 47-53 (2013)Computational Lower Bounds for Colourful Simplicial Depth, , and . CoRR, (2012)