Search for persons
X
?
2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity) ,
1
A Method for Anomaly Detection in Power Energy Topology Gra..:
, In:
?
2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) ,
2
An ultra-short-term wind power prediction method based on C..:
, In:
?
Springer Series in Optical Sciences; Ultrafast Laser Nanostructuring ,
3
Macroscale Microfabrication Enabled by Nanoscale Morphologi..:
, In:
?
2023 9th International Conference on Big Data and Information Analytics (BigDIA) ,
4
Confidence Assessment Method for Association Rule Mining Ba..:
, In:
?
2023 IEEE/CVF International Conference on Computer Vision (ICCV) ,
5
High Quality Entity Segmentation:
, In:
?
2023 4th International Conference on Computers and Artificial Intelligence Technology (CAIT) ,
6
The Optimization and Improvement of Campus Network Based on..:
, In:
?
Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application ,
7
A Network Application Fault Repair Method Based on Reinforc..:
, In:
?
2023 IEEE International Conference on Multimedia and Expo (ICME) ,
8
Masked Cross-image Encoding for Few-shot Segmentation:
, In:
?
2022 IEEE International Conference on Image Processing (ICIP) ,
9
Enhanced Deep Animation Video Interpolation:
, In:
?
2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) ,
10
Body Alcohol Level Detection Based on Measurements of Human..:
, In:
?
2022 IEEE 8th International Conference on Computer and Communications (ICCC) ,
11
T-PPA: A Privacy-Preserving Decentralized Payment System wi..:
, In:
?
2021 International Conference on Computer Technology and Media Convergence Design (CTMCD) ,
12
Image Noise Estimation Algorithm Based on Super-pixel Segme..:
, In:
?
2021 IEEE International Conference on Robotics and Automation (ICRA) ,
13
Amplifying Laminar Jamming for Soft Robots by Geometry-Indu..:
, In:
?
Advances in Artificial Intelligence and Security; Communications in Computer and Information Science ,
14
LSTM-Exploit: Intelligent Penetration Based on LSTM Tool:
, In:
?
Computer Vision – ACCV 2020; Lecture Notes in Computer Science ,
15