Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Monitoring and a Finite State Automata Model., , , , and . CSSE (2), page 646-649. IEEE Computer Society, (2008)978-0-7695-3336-0.Adversarial Sub-sequence for Text Generation., , , , , , and . CoRR, (2019)Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing., , , , , , and . CoRR, (2018)An Improved Framework of Disaster-Tolerance Oriented Adaptive Failure Detection., , , and . ISCID (1), page 228-231. IEEE Computer Society, (2011)An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure., , and . JCP, 8 (11): 2851-2856 (2013)Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation., , , and . Int. J. Online Eng., 14 (6): 71-84 (2018)Bag-of-Embeddings for Text Classification., , , and . IJCAI, page 2824-2830. IJCAI/AAAI Press, (2016)The Construction of a Kind of Chat Corpus in Chinese Word Segmentation., , and . WI-IAT (3), page 168-172. IEEE Computer Society, (2015)978-1-4673-9618-9.Network System Model-Based Multi-level Policy Generation and Representation., , , , and . CSSE (2), page 283-287. IEEE Computer Society, (2008)978-0-7695-3336-0.Parallel Acceleration of IBM Alignment Model based on Lock-Free Hash Table., , , , and . CIS, page 423-427. IEEE, (2016)