Author of the publication

Bioinformatics databases for network pharmacology research of traditional Chinese medicine: A systematic review.

, , , and . BIBM, page 1400-1404. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Vehicle Identification Based on Car-Following Data With Machine Learning., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 13893-13902 (December 2023)LESS: Link Estimation with Sparse Sampling in Intertidal WSNs., , , , and . Sensors, 18 (3): 747 (2018)Acoustic Velocity-Independent 2-D DOA Estimation for Underwater Application., , , and . J. Commun. Inf. Networks, 7 (4): 457-466 (December 2022)MLE: A General Multi-Layer Ensemble Framework for Group Recommendation., , , and . ICSOC Workshops, volume 11434 of Lecture Notes in Computer Science, page 351-366. Springer, (2018)Using 3D road geometry to optimize heavy truck fuel efficiency., , , and . ITSC, page 334-339. IEEE, (2008)Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network., , , , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 256-265. Springer, (2018)An agent-based simulation model for distributed vehicle sharing operations., , , and . WSC, page 1336-1347. IEEE, (2017)Real-World Trajectory Extraction from Aerial Videos - A Comprehensive and Effective Solution., and . ITSC, page 2854-2859. IEEE, (2019)A Heuristic Approach to the Railroad Track Maintenance Scheduling Problem., , , , , and . Comput. Aided Civ. Infrastructure Eng., 26 (2): 129-145 (2011)Exploiting the Inherent Limitation of L0 Adversarial Examples., , , and . RAID, page 293-307. USENIX Association, (2019)