Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data-Efficient Framework for Training and Sim-to-Real Transfer of Navigation Policies., , , and . ICRA, page 782-788. IEEE, (2019)Proposal of PAPR reduction method for OFDM signal by optimized PTS combined with interleaving method., , and . ChinaSIP, page 943-947. IEEE, (2015)Fault Diagnosis Method Based on Gap Metric Data Preprocessing and Principal Component Analysis., , , and . J. Control. Sci. Eng., (2018)CatE: Category-Name GuidedWord Embedding., , , , , and . CoRR, (2019)Why It Takes So Long to Connect to a WiFi Access Point., , , , , , , , and . CoRR, (2017)A Hybrid Bionic Image Sensor Achieving FOV Extension and Foveated Imaging., , , and . Sensors, 18 (4): 1042 (2018)Individual Data Plan in Virtual Network Operation: A Proactive Matching Approach., , , and . INFOCOM, page 271-279. IEEE, (2019)The Behavior Symptoms of Undergraduates' Social Anxiety in the Virtual World., , , , and . CW, page 447-450. IEEE, (2018)SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks., , , , and . ICONIP (2), volume 11302 of Lecture Notes in Computer Science, page 253-264. Springer, (2018)Automatically Traceback RDP-Based Targeted Ransomware Attacks., , , , , and . Wireless Communications and Mobile Computing, (2018)