From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of Discrete Nonlinear Systems With Injection Attacks Under Iterative Learning Schemes., , , и . IEEE Trans. Syst. Man Cybern. Syst., 52 (2): 927-935 (2022)In silico genome mining of potential novel biosynthetic gene clusters for drug discovery from Burkholderia bacteria., , , , , , и . Comput. Biol. Medicine, (2022)The Target Recovery Strategy for Preventing Avalanche Breakdown on Interdependent Community Networks., , , , и . Complex., (2020)Corrigendum: Small target detection with remote sensing images based on an improved YOLOv5 algorithm., , и . Frontiers Neurorobotics, (июня 2023)An efficient scheduling approach for multi-level industrial chain flows in time-sensitive networking., , , и . Comput. Networks, (февраля 2023)enDRTS: Deep Reinforcement Learning Based Deterministic Scheduling for Chain Flows in TSN., , , , и . NaNA, стр. 239-244. IEEE, (2023)Hidden inheritance: an inline caching design for TypeScript performance., , , , , и . Proc. ACM Program. Lang., 4 (OOPSLA): 174:1-174:29 (2020)Effects of heterogeneous self-protection awareness on resource-epidemic coevolution dynamics., , , , и . CoRR, (2020)Small target detection with remote sensing images based on an improved YOLOv5 algorithm., , и . Frontiers Neurorobotics, (сентября 2022)Tracking Control of Mobile Robots based on Rhombic Input Constraints., , и . J. Robotics Netw. Artif. Life, 8 (4): 284-288 (2022)