42 results on '"Xiaolei LIU"'
Search Results
2. Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection.
3. SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
4. An Embarrassingly Simple Approach to Enhance Transformer Performance in Genomic Selection for Crop Breeding.
5. Driver behavior analysis in diverging area based on driving simulation.
6. Usability Evaluation of FURS Robot Control Panel Interface Design Based on SUS.
7. Neural Node Matching for Multi-Target Cross Domain Recommendation.
8. Sparse Black-Box Inversion Attack with Limited Information.
9. Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
10. Automatic Selection Attacks Framework for Hard Label Black-Box Models.
11. Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection.
12. C3MNet: Customized Multi-Channel Muscle Motion Network for Yawn-Based Fatigue Emotion Detection.
13. A Frown-Based Thermal Comfort Detection Method of Facial Emotion Recognition.
14. Performance Degradation Prediction of Aircraft Auxiliary Power Unit Using the Improved SVR.
15. Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing.
16. THOR, Trace-based Hardware-driven Layer-Oriented Natural Gradient Descent Computation.
17. A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
18. Weighted-Sampling Audio Adversarial Example Attack.
19. A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks.
20. An optimized fusion method for double-wearable-wireless-band platform on remote controller.
21. Nonlinear FHR baseline estimation using empirical mode decomposition and Kohonen neural network.
22. Fetal heart rate analysis using a non-linear baseline and variability estimation method.
23. Improved Reaching Law Sliding Mode Control Applied to Active Power Filter.
24. Indoor dangerous gas environment detected by mobile robot.
25. Research On Automatic Cutting Method of Oil Cone Sleeve Sample
26. ICTNET at Microblog Track in TREC 2014.
27. Traffic sign detection and recognition via transfer learning
28. The development of multimedia accounting challenges the quality of accounting personnel
29. Discussion about Problems and Corresponding Countermeasures in Enterprise Informatization Construction.
30. Predicting Thermophilic Nucleotide Sequences Based on Chaos Game Representation Features and Support Vector Machine.
31. Laser range finder based moving object tracking and avoidance in dynamic environment.
32. The Technology Optimum and Reaction Dynamics of the Simulative Explosive Industrial Wastewater Degradation in Supercritical (Sub-Critical) Water.
33. Improvement on obstacle avoiding ability based on laser range finder.
34. Hardware implementation of a hybrid protection scheme for bipolar HVDC line.
35. Hybrid traveling wave/boundary protection for bipolar HCDC line.
36. Humanoid detection of indoor dangerous gas source by mobile robot.
37. Advanced simulation tool for relay testing.
38. Stationary Wavelet Transform Based HVDC Line Protection.
39. A nanotube-on-insulator (NOI) approach toward scalable and integratable nanotube devices on sapphire.
40. Synthesis of InN nanowires using a two-zone chemical vapor deposition approach.
41. Gas sensing properties of single-crystalline indium oxide nanowires.
42. GaAs Schottky barrier diodes for THz applications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.