Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Through Dialogue Interactions., , , , and . CoRR, (2016)A Novel Analysis Method of Geographical Centrality Based on Space of Flows., , and . ISPRS Int. J. Geo Inf., 6 (5): 153 (2017)Relation-Aware Pyramid Network (RapNet) for temporal action proposal., , , , , and . CoRR, (2019)Cases Study of Inputs Split Based Calibration Method for RRAM Crossbar., , , , , , and . IEEE Access, (2019)Surface Defects Detection and Identification of Lithium Battery Pole Piece Based on Multi-Feature Fusion and PSO-SVM., , , and . IEEE Access, (2021)Ownership Verification of DNN Architectures via Hardware Cache Side Channels., , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (11): 8078-8093 (2022)Evaluating the Evacuation and Rescue Capabilities of Urban Open Space from a Land Use Perspective: A Case Study in Wuhan, China., , , , and . ISPRS Int. J. Geo Inf., 6 (7): 227 (2017)Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design., , , , and . ACM Trans. Embed. Comput. Syst., 18 (1): 2:1-2:26 (2019)IcoRating: A Deep-Learning System for Scam ICO Identification., , , , , , , , , and 2 other author(s). CoRR, (2018)Inferring User Preferences by Probabilistic Logical Reasoning over Social Networks., , and . CoRR, (2014)