Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Combinatorial Fusion Method for Feature Construction., , , and . DMIN, page 260-266. CSREA Press, (2009)Three-Dimensional Path Following of an Underactuated AUV Based on Fuzzy Backstepping Sliding Mode Control., , , and . Int. J. Fuzzy Syst., 20 (2): 640-649 (2018)TRUSTER: TRajectory Data Processing on ClUSTERs., , , and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 768-771. Springer, (2009)Multivoltage Floorplan Design., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 29 (4): 607-617 (2010)Cε-LDE: A lightweight variant of differential evolution algorithm with combined ε constrained method and Lévy flight for constrained optimization problems., , , , , and . Expert Syst. Appl., (2023)WAVE: Edge-Device Cooperated Real-Time Object Detection for Open-Air Applications., , , , , and . IEEE Trans. Mob. Comput., 22 (7): 4347-4357 (July 2023)WeExt: A Framework of Extending Deterministic Knowledge Graph Embedding Models for Embedding Weighted Knowledge Graphs., , , , , , and . IEEE Access, (2023)A probabilistic constant amplitude life diagram modeling method for composite materials considering spatial mapping relation., , , , and . Qual. Reliab. Eng. Int., 39 (5): 2027-2043 (July 2023)SNS user classification and its application to obscure POI discovery., , and . Multim. Tools Appl., 76 (4): 5461-5487 (2017)Cyber attack estimation and detection for cyber-physical power systems., , , , , , and . Appl. Math. Comput., (2021)