Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rush-Hour Vehicles Scheduling Strategy in Online Car-Sharing System Based on Urban Trajectory Data Analysis., , and . IOV, volume 10689 of Lecture Notes in Computer Science, page 31-40. Springer, (2017)Cross-Dataset Person Re-identification Using Similarity Preserved Generative Adversarial Networks., and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 171-183. Springer, (2018)Studies on the Computational Modeling and Design of Financial Markets.. AAMAS, page 2452-2454. International Foundation for Autonomous Agents and Multiagent Systems, (2019)A Cloaking Mechanism to Mitigate Market Manipulation., , and . IJCAI, page 541-547. ijcai.org, (2018)T-CONV: A Convolutional Neural Network For Multi-scale Taxi Trajectory Prediction., , and . CoRR, (2016)Spoofing the Limit Order Book: An Agent-Based Model., and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)A Survey of Routing Protocols in WBAN for Healthcare Applications., , , , , and . Sensors, 19 (7): 1638 (2019)