Personensuche
X
?
2023 IEEE/CVF International Conference on Computer Vision (ICCV) ,
1
CASSPR: Cross Attention Single Scan Place Recognition:
, In:
?
2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) ,
2
Applying Extension Semantic Web to Event Representation for..:
, In:
?
2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) ,
3
Integration of Information Models for Industrial Intemet Ba..:
, In:
?
2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) ,
4
An Improved K-means Clustering Algorithm:
, In:
?
2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2) ,
7
Research on Testing Methods for Memory Data Abnormal Bit Fl..:
, In:
?
2023 38th Youth Academic Annual Conference of Chinese Association of Automation (YAC) ,
8
Time-Synchronized Control of Unmanned Dynamic Positioning S..:
, In:
?
2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta) ,
9
LogBlock: An Anomaly Detection Method on Permissioned Block..:
, In:
?
Knowledge Science, Engineering and Management; Lecture Notes in Computer Science ,
10
PUF-Based Intellectual Property Protection for CNN Model:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
11
A Compatible and Identity Privacy-preserving Security Proto..:
, In:
?
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12
A TDOA-Assisted Direct Position Determination for Efficient..:
, In:
?
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
13