Author of the publication

Lecture Notes on the Application of Eigenvalue Decomposition in Signal Processing.

, , , , , and . TALE, page 1-5. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging online behaviors for interpretable knowledge-aware patent recommendation., , , and . Internet Res., 32 (2): 568-587 (2022)Metabolic characterization of the chitinolytic bacterium Serratia marcescens using a genome-scale metabolic model., , , and . BMC Bioinform., 20 (1): 227:1-227:13 (2019)Double Attention Mechanism for Sentence Embedding., , and . WISA, volume 11242 of Lecture Notes in Computer Science, page 228-239. Springer, (2018)Throughput-Efficient Blockchain for Internet-of-Vehicles., , , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)DScGANS: Integrate Domain Knowledge in Training Dual-Path Semi-supervised Conditional Generative Adversarial Networks and S3VM for Ultrasonography Thyroid Nodules Classification., , , , , , , and . MICCAI (4), volume 11767 of Lecture Notes in Computer Science, page 558-566. Springer, (2019)A text analytics framework for understanding the relationships among host self-description, trust perception and purchase behavior on Airbnb., , and . Decis. Support Syst., (2020)A computational framework for understanding antecedents of guests' perceived trust towards hosts on Airbnb., , and . Decis. Support Syst., (2018)DVREI: Dynamic Verifiable Retrieval Over Encrypted Images., , , , , , , and . IEEE Trans. Computers, 71 (8): 1755-1769 (2022)Two-stream vision transformer based multi-label recognition for TCM prescriptions construction., , , , , and . Comput. Biol. Medicine, (March 2024)Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)