Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase., , , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 256-268. Springer, (2017)Robot Navigation using Velocity Potential Fields and Particle Filters for Obstacle Avoidance., , and . ICINCO (1), page 43-48. SciTePress, (2015)Dry-type air-core Smoothing Reactor Based on Inter-turn Insulation Thickness Design., , , , , , and . CRC, page 202-206. IEEE, (2023)Implement the intelligent carpet system and application design based on sensor technique., , and . IISA, page 1-4. IEEE, (2017)Application of QR Two-dimension Code Technology in Credits Certification System., , , and . ICCC, page 222. ACM, (2013)DASZL: Dynamic Action Signatures for Zero-shot Learning., , , , , , , , and . AAAI, page 1817-1826. AAAI Press, (2021)Statistical characteristic of spectrum for ambient noise at high frequencies in shallow water., , , , , and . ICSPCC, page 1-4. IEEE, (2017)A Network Protection Framework for DNP3 over TCP/IP protocol., , and . AICCSA, page 9-15. IEEE Computer Society, (2014)Automatic Procurement Fraud Detection with Machine Learning., and . CoRR, (2023)MCFEND: A Multi-source Benchmark Dataset for Chinese Fake News Detection., , , and . WWW, page 4018-4027. ACM, (2024)