Search for persons
X
?
Handbook of Latent Variable and Related Models; Handbook of Computing and Statistics with Applications ,
1
6 Local Influence Analysis for Latent Variable Models with ..:
, In:
?
Handbook of Latent Variable and Related Models ,
3
Local Influence Analysis for Latent Variable Models with No..:
, In:
?
2023 9th International Conference on Control Science and Systems Engineering (ICCSSE) ,
4
Steel Surface Defect Detection Based on Improved YOLOv5:
, In:
?
2022 IEEE MTT-S International Microwave Workshop Series on Advanced Materials and Processes for RF and THz Applications (IMWS-AMP) ,
5
Ka-band 20W power amplifier MMIC for satellite communicatio:
, In:
?
Clean Coal and Sustainable Energy; Environmental Science and Engineering ,
6
Industrial Experimental and Numerical Simulation Study on t..:
, In:
?
Springer Series in Geomechanics and Geoengineering; Proceedings of the International Field Exploration and Development Conference 2022 ,
7
Experimental Study on the Effects of Polymers on Soil Micro..:
, In:
?
Communications in Computer and Information Science; Computer Science and Education. Teaching and Curriculum ,
8
Design on Experimental Dataset and Task for Teaching in Dat..:
, In:
?
2022 IEEE 8th International Conference on Cloud Computing and Intelligent Systems (CCIS) ,
9
InterCLIP: Adapting CLIP To Interactive Image Retrieval wit..:
, In:
?
Springer Series in Geomechanics and Geoengineering; Proceedings of the International Field Exploration and Development Conference 2023 ,
11
Study on Surfactants for Replenish Energy Before Fracturing..:
, In:
?
Water Security: Big Data-Driven Risk Identification, Assessment and Control of Emerging Contaminants ,
12
List of contributors:
, In:
?
2023 IEEE 5th Eurasia Conference on IOT, Communication and Engineering (ECICE) ,
13
House Inspection System Using Artificial Intelligence for C..:
, In:
?
2022 26th International Conference on Pattern Recognition (ICPR) ,
14
DANet: Dynamic Attention to Spoof Patterns for Face Anti-Sp..:
, In:
?
Intelligent Computing Theories and Application; Lecture Notes in Computer Science ,
15