Author of the publication

Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion.

, , , , , and . CWSN, volume 1715 of Communications in Computer and Information Science, page 31-43. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On difference graphs and the local dimension of posets., , , , , , and . CoRR, (2018)Position Estimation Method of IPMSM in Full Speed Range by Simplified Quadratic Optimization., , , , , and . IEEE Access, (2020)Snr-Based Teachers-Student Technique For Speech Enhancement., , , , , and . ICME, page 1-6. IEEE, (2020)High-efficiency K-band MMIC power amplifier using multi-harmonic load terminations., , , , , , , , and . Microelectron. J., 46 (12): 1453-1458 (2015)Discovering periodic patterns of nodal encounters in mobile networks., , and . Pervasive Mob. Comput., 9 (6): 892-912 (2013)Towards Efficient Visual Adaption via Structural Re-parameterization., , , , , , and . CoRR, (2023)Container Orchestration in Edge and Fog Computing Environments for Real-Time IoT Applications., , , and . CoRR, (2022)Improvement of APACHE II score system for disease severity based on XGBoost algorithm., , and . BMC Medical Informatics Decis. Mak., 21 (1): 237 (2021)On Hamiltonian Berge cycles in 3-uniform hypergraphs., and . Discret. Math., 344 (8): 112462 (2021)Mangling Rules Generation With Density-Based Clustering for Password Guessing., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 3588-3600 (September 2023)