Search for persons
X
?
2023 IEEE 17th International Conference on Anti-counterfeiting, Security, and Identification (ASID) ,
1
A DCA Attack Scheme and a Genetic Algorithm-based Intellige..:
, In:
?
2023 4th International Conference on Smart Grid and Energy Engineering (SGEE) ,
2
A Multi-Task Joint Learning Framework for Transformer Fault..:
, In:
?
2023 IEEE International Conference on Mechatronics and Automation (ICMA) ,
3
Gaze Following Based on Attention Mechanism:
, In:
?
2023 10th International Forum on Electrical Engineering and Automation (IFEEA) ,
4
Improved ViT Multimodal Anomaly Detection for Electricity e..:
, In:
?
2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) ,
5
The Improvement Method of Distributed Renewable Energy Cons..:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
6
Application of UPT-POCT in Public Health Emergencies:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
7
Application of UPT-POCT in Detection of Drugs:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
8
Application of UPT-POCT in Combat-Related Traumatic Infecti..:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
9
Application of UPT-POCT in Internal Medicine:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
10
Application of UPT-POCT in Import and Export Quarantine:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
11
Application of UPT-POCT in Detection of Foodborne Pathogens:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
12
Application of UPT-POCT in Medical Relief for Disasters:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
13
Application of UPT-POCT in Emergency Medicine:
, In:
?
Principles and Applications of Up-converting Phosphor Technology ,
14
Application of UPT-POCT in Detection of Food Safety Related..:
, In:
?
2009 Fifth International Conference on Information Assurance and Security ,
15