Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Nine Markers to Predict Nonalcoholic Fatty Liver Disease for a Chinese Diabetic Population., , , , , , and . J. Medical Imaging Health Informatics, 11 (3): 730-735 (2021)Solid Particle Swarm Measurement in Jet Fuel Based on Mie Scattering Theory and Extinction Method., , , , , , , and . Sensors, 23 (5): 2837 (March 2023)Lightweight and intelligent model based on enhanced sparse filtering for rotating machine fault diagnosis., , , , , , , and . Trans. Inst. Meas. Control, 46 (5): 858-870 (2024)An ensemble machine learning-based modeling framework for analysis of traffic crash frequency., , and . Comput. Aided Civ. Infrastructure Eng., 35 (3): 258-276 (2020)Exploration With Task Information for Meta Reinforcement Learning., , and . IEEE Trans. Neural Networks Learn. Syst., 34 (8): 4033-4046 (August 2023)PA Ph&Tech at SemEval-2022 Task 11: NER Task with Ensemble Embedding from Reinforcement Learning., , , , , , , , and . SemEval@NAACL, page 1444-1447. Association for Computational Linguistics, (2022)Medical Knowledge Guided Intra-Specimen Reference Network for Cervical Cell Classification., , , , , , and . ISBI, page 1-5. IEEE, (2023)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)Exploration and Regularization of the Latent Action Space in Recommendation., , , , , , , , , and . WWW, page 833-844. ACM, (2023)