Personensuche
X
?
2022 5th International Conference on Artificial Intelligence and Big Data (ICAIBD) ,
1
Forgery Face Image Detection Based on Improved Capsule Netw..:
, In:
?
Advances in Hydroinformatics; Springer Water ,
2
Study on Forecasting and Alarming Model of Flash Flood Base..:
, In:
?
2022 IEEE International Conference on Industrial Technology (ICIT) ,
3
Virtual Reality Image Dataset vCAT Helps Research on Semant..:
, In:
?
2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2) ,
4
Tie-Line Scheduling Based on Equivalents of Regional Power ..:
, In:
?
Intelligent Robotics and Applications; Lecture Notes in Computer Science ,
5
Modeling of Passive Dynamic Walking Behavior of the Asymmet..:
, In:
?
2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
6
Analysis on Ride Comfort of a Novel Eight Wheel Vehicle:
, In:
?
2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
7
Towards a more practical data-driven biped walking control:
, In:
?
Intelligent Robotics and Applications; Lecture Notes in Computer Science ,
8
Research on Passive Energy-Regulated Bionic Shell for Later..:
, In:
?
2020 IEEE International Conference on Mechatronics and Automation (ICMA) ,
9
Continuity and Smoothness Analysis and Possible Improvement..:
, In:
?
2019 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
10
Practical Vision-Based Walking Navigation for the Humanoid ..:
, In:
?
2019 IEEE International Conference on Mechatronics and Automation (ICMA) ,
11
Practical Kicking Motion Generation Method for NAO:
, In:
?
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation ,
12
Programming support for autonomizing software:
, In:
?
2019 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
13
Gait Analysis of the Mammal Quadruped Robot from the Perspe..:
, In:
?
Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization ,
14
White-box program tuning:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15