Jing, Yaping
10  results:
Search for persons X
?
1

Spoof Face Detection Via Semi-Supervised Adversarial Traini..:

, In: 2022 International Joint Conference on Neural Networks (IJCNN),
Chen, Chengwei ; Jing, Yaping ; Lu, Xuequan.. - p. 1-6 , 2022
 
?
2

Action and State Based Computation Tree Measurement Languag..:

, In: Quantitative Evaluation of Systems; Lecture Notes in Computer Science,
Jing, Yaping ; Miner, Andrew S. - p. 190-206 , 2018
 
?
3

Analysis of Artifactual Components Rejection Threshold towa..:

, In: 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC),
 
?
4

Crystalline Complex Oxide Membrane: Sub-1 nm CET Dielectric..:

, In: 2022 International Electron Devices Meeting (IEDM),
Huang, Jing-Kai ; Wan, Yi ; Shi, Junjie... - p. 7.6.1-7.6.4 , 2022
 
?
5

Effluent ammonia nitrogen prediction of wastewater treatmen..:

, In: 2022 37th Youth Academic Annual Conference of Chinese Association of Automation (YAC),
Wang, Lei ; Zhao, Jing ; Hu, Zhiqiang. - p. 753-756 , 2022
 
?
6

Maximizing the Average Secrecy Rate for UAV-assisted MEC: A..:

, In: 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC),
Jing, Letian ; Jia, Xiangdong ; Lv, Yaping. - p. 2514-2518 , 2021
 
?
7

Direct Thermal Load Control in Active Distribution Networks..:

, In: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2),
Chen, Zhuoxu ; Liu, Haotian ; Wu, Wenchuan... - p. 3184-3189 , 2021
 
?
8

Grey relational analysis model of classified variables and ..:

, In: 2017 International Conference on Grey Systems and Intelligent Services (GSIS),
Xu, Jing ; Li, Yaping - p. 105-105 , 2017
 
?
9

A quantitative assessment method for source-load interactio:

, In: 2014 China International Conference on Electricity Distribution (CICED),
Yang, Shengchun ; Zhou, Jing ; Li, Yaping... - p. 472-477 , 2014
 
?
10

An Incentive Mechanism Using Game Theory for P2P Networks:

, In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing,
 
1-10