Author of the publication

A Program Threat Judgement Model Based on Fuzzy Set Theory.

, , , and . ITITS (2), volume 455 of Advances in Intelligent Systems and Computing, page 221-233. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TB-Net: A Three-Stream Boundary-Aware Network for Fine-Grained Pavement Disease Segmentation., , , and . CoRR, (2020)Cross-domain recommendation with Multi-Auxiliary Domains via Consistent and Selective Cluster-Level Knowledge Transfer., , and . Expert Syst. Appl., (August 2023)Why should you trust my interpretation? Understanding uncertainty in LIME predictions., , , , and . CoRR, (2019)Beyond Crack: Fine-Grained Pavement Defect Segmentation Using Three-Stream Neural Networks., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 14820-14832 (2022)NOCT: Nonlinear Observability with Constraints and Time Offset., , and . CoRR, (2022)Sparse Reduced-Rank Regression With Adaptive Selection of Groups of Predictors., , and . ACSCC, page 145-149. IEEE, (2021)HDPV-SLAM: Hybrid Depth-Augmented Panoramic Visual SLAM for Mobile Mapping System with Tilted LiDAR and Panoramic Visual Camera., , , , , and . CASE, page 1-8. IEEE, (2023)RPV-SLAM: Range-augmented Panoramic Visual SLAM for Mobile Mapping System with Panoramic Camera and Tilted LiDAR., , , , and . ICAR, page 1066-1072. IEEE, (2021)The Mobile AR Sensor Logger for Android and iOS devices., , and . IEEE SENSORS, page 1-4. IEEE, (2019)Discrete Similarity Preserving Hashing for Cross-modal Retrieval., , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 202-213. Springer, (2019)