Personensuche
X
?
Lecture Notes in Computer Science; Advances in Swarm Intelligence ,
1
An Improved Multi-objective Optimization Algorithm Based on..:
, In:
?
2022 China Automation Congress (CAC) ,
2
An Ant-based Optimizer for the Training of Convolutional Ne..:
, In:
?
2022 Asian Conference on Frontiers of Power and Energy (ACFPE) ,
3
Research on power limiting strategy of PV Power generation ..:
, In:
?
2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2) ,
4
Software Phase Locked Loop Based on SOGI Transform:
, In:
?
2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) ,
5
State-of-Charge (SOC) Estimation of Lithium-Ion Battery Bas..:
, In:
?
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC) ,
6
A Precision-Scalable RISC-V DNN Processor with On-Device Le..:
, In:
?
2023 IEEE 36th International System-on-Chip Conference (SOCC) ,
7
An Efficient Hardware Design for Fast Implementation of HQC:
, In:
?
2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD) ,
8
Intrusion Detection Method for SCADA System Based on Spatio..:
, In:
?
2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA) ,
9
ViTALiTy: Unifying Low-rank and Sparse Approximation for Vi..:
, In:
?
2023 IEEE International Symposium on Circuits and Systems (ISCAS) ,
10
PDPU: An Open-Source Posit Dot-Product Unit for Deep Learni..:
, In:
?
Arithmetic of Finite Fields; Lecture Notes in Computer Science ,
11
Reduction-Free Multiplication for Finite Fields and Polynom..:
, In:
?
2022 International Symposium on Educational Technology (ISET) ,
12
Teaching Chemical Engineering Unit Operations Using Blended..:
, In:
?
2022 8th International Conference on Mechanical Engineering and Automation Science (ICMEAS) ,
13
3D TFSI FEA Simulation and Analysis of Thermodynamic Charac..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
14
Adversarial Attacks on Deep Learning-Based Methods for Netw..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
15