Author of the publication

Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks.

, , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Person re-identification by manifold ranking., , and . ICIP, page 3567-3571. IEEE, (2013)On-the-fly feature importance mining for person re-identification., , and . Pattern Recognit., 47 (4): 1602-1615 (2014)Learning Lightweight Lane Detection CNNs by Self Attention Distillation., , , and . ICCV, page 1013-1021. IEEE, (2019)NADPEx: An on-policy temporally consistent exploration method for deep reinforcement learning., , , , , , and . ICLR (Poster), OpenReview.net, (2019)Spread-Spectrum Watermark by Synthesizing Texture., , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 347-356. Springer, (2007)Learning a Decision Module by Imitating Driver's Control Behaviors., , , , , , and . CoRL, volume 155 of Proceedings of Machine Learning Research, page 1-10. PMLR, (2020)Learning to Simulate Self-driven Particles System with Coordinated Policy Optimization., , , , and . NeurIPS, page 10784-10797. (2021)Learning Driving Decisions by Imitating Drivers' Control Behaviors., , , , , , , and . CoRR, (2019)Complex magnetic and spatial symmetry breaking from correlations in kagome flat bands, , and . (2023)cite arxiv:2307.11810 Comment: 7+18 pages, 4+10 figures.Network pruning via resource reallocation., , , , and . Pattern Recognit., (January 2024)